MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Guide To Network Security



Guide To Network Security
Guide To Network Security, International Edition is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications an... more details

R1 544.00 from Loot.co.za

price history Price history

BP = Best Price   HP = Highest Price

Current Price: R1 544.00

loading...

tagged products icon   Similarly Tagged Products

Description
Guide To Network Security, International Edition is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, Guide To Network Security, International Edition is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.
Review:
1. Introduction to Information Security. 2. Introduction to Networking. 3. Cryptography. 4. Firewall Technologies and Administration. 5. Access Controls and Remote Access. 6. Intrusion Detection and Prevention. 7. Wireless Network Security. 8. Security of Web Applications. 9. Network Vulnerability Assessment. 10. Auditing, Monitoring, and Logging. 11.Contingency Planning and Networking Incident Response. 12. Digital Forensics and eDiscovery.

Top offers

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.