Guide to Network Defense and Countermeasures, 2E is the second of two books that are required for Level One of the Security Certified Program (SCP). This edition has been revised with updated content and maps clearly to the exam objectives for the current Security Certified Network Professional (SCNP) exam. Although the primary emphasis is on intrusion detection, the book also covers such essential practices as developing a security policy and then implementing that policy by performing Network Address Translation, setting up packet filtering, and installing proxy servers, firewalls, and virtual private networks.
Rezensionen / Stimmen
1. Network Defense Fundamentals 2. Security Policy Designs 3. Security Policy Implementation 4. Network Traffic Signatures 5. Virtual Private Network (VPN) Concepts 6. Virtual Private Network (VPN) Implementation 7. Intrusion Detection System Concepts 8. Intrusion Detection: Incident Response 9. Firewall Concepts 10. Firewall Topology 11. Firewall Configuration 12: Strengthening Defense through Ongoing Management Appendix A: SCO-402 Objectives Appendix B: Security Resources
Auflage
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Editions-Typ
Maße
Höhe: 235 mm
Breite: 187 mm
Dicke: 30 mm
Gewicht
ISBN-13
978-1-4188-3679-5 (9781418836795)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Randy Weaver is an academic program director for Everest College, where he administers IT programs and teaches IT courses covering operating systems, networking, computer forensics, and various security topics. Weaver currently teaches and oversees programs for the Phoenix and Mesa campuses, as well as Everest's online education offerings. He has passed more than 40 industry certification exams, including CISSP and Security+, and holds a master's degree in information technology.
1. Network Defense Fundamentals 2. Security Policy Designs 3. Security Policy Implementation 4. Network Traffic Signatures 5. Virtual Private Network (VPN) Concepts 6. Virtual Private Network (VPN) Implementation 7. Intrusion Detection System Concepts 8. Intrusion Detection: Incident Response 9. Firewall Concepts 10. Firewall Topology 11. Firewall Configuration 12: Strengthening Defense through Ongoing Management Appendix A: SCO-402 Objectives Appendix B: Security Resources