Here's easy-to-understand book that introduces you to fundamental network security concepts, principles, and terms, while providing you with practical techniques that you can apply on the job. It helps you identify the best type of intrusion detection system for your environment, develop organizatio
Fundamentals of network security
โ Scribed by John E. Canavan
- Publisher
- Artech House
- Year
- 2001
- Tongue
- English
- Leaves
- 218
- Series
- Artech House telecommunications library
- Edition
- 1st
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Here's easy-to-understand book that introduces you to fundamental network security concepts, principles, and terms, while providing you with practical techniques that you can apply on the job. It helps you identify the best type of intrusion detection system for your environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment . The book presents specific tools that can be used to test, strengthen, monitor, and hack systems. From LAN/WAN security, cryptography, digital signatures and certificates, and encryption on the Web: to secure e-mail protocols, biometrics, virtual private network protocols and firewalls, it covers essential topics on network security that can be understood even if you don't have a technical background. Over 110 illustrations clarify key concepts throughout the book.
๐ SIMILAR VOLUMES
Many books focus on one operating system when considering network security. John E. Canavan's reference work covers principles and practical applications that can be used with all operating systems.
Many books focus on one operating system when considering network security. John E. Canavan's reference work covers principles and practical applications that can be used with all operating systems.
It tries to cover the majority of network security topics, but fails when it gives passing mentions to some of the most important ones. Some statements are at least misinformed if not plain wrong. The author favors Microsoft based solutions, though a book on this subject should be as OS agnostic as
Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to a