Buy Guide to Firewalls and Network Security - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > Guide to Firewalls and Network Security
Guide to Firewalls and Network Security

Guide to Firewalls and Network Security


     0     
5
4
3
2
1



Available


X
About the Book

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.

Table of Contents:
Introduction. Chapter 1 - Introduction to Information Security. Chapter 2- An Introduction to Networking. Chapter 3- Security Policies, Standards, and Planning. Chapter 4 - Finding Network Vulnerabilities. Chapter 5 - Firewall Planning and Design. Chapter 6 - Packet Filtering. Chapter 7 - Working with Proxy Servers and Application-Level Firewalls. Chapter 8 - Firewall Configuration and Administration. Chapter 9 - Encryption and Firewalls. Chapter 10 - Authenticating. Chapter 11 - Setting Up a Virtual Private Network. Chapter 12 - Contingency Planning. Chapter 13 - Intrusion Detection and Prevention Systems. Chapter 14 - Digital Forensics.

About the Author :
Greg Holden is the author of more than 35 books on Internet- and computer-related topics, including the Web design applications Microsoft FrontPage and Macromedia Dreamweaver. He also does Web development for the design firm NewCor Group. He helped design recruitment literature and course catalogs for the University of Chicago. He lives in Chicago with his two teenage daughters and assorted birds, fish, and other pets. Herbert Mattord, Ph.D., CISM, CISSP completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security & Assurance as well as Information Systems. He and Michael Whitman are the authors of Principles of Information Security, 5th Ed, Management of Information Security, 5th Ed, Readings and Cases in the Management of Information Security, Principles of Incident Response and Disaster Recovery, 2nd Ed, The Guide to Network Security, and The Hands-On Information Security Lab Manual, 4th Ed all from Cengage Learning. Dr. Mattord is an active researcher and author in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where much of the practical knowledge found in this and other textbooks was acquired. Michael Whitman, Ph.D., CISM, CISSP is a Professor of Information Security at Kennesaw State University, Kennesaw, Georgia, where he is also the Executive Director of the KSU/Coles College of Business Center for Information Security Education. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU's successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CD) awarded by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Information Security Education Journal, and Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, and Curriculum Development, as well as Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print - Principles of Information Security, 5th Ed., Management of Information Security, 5th Ed., Readings and Cases in the Management of Information Security, Volumes I and II, The Hands-On Information Security Lab Manual, 4th Ed., Principles of Incident Response and Disaster Recovery, 2nd Ed., The Guide to Network Security and The Guide to Firewalls and Network Security, 3rd Ed. all from Cengage Learning. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Prior to coming to academia, Dr. Whitman was an officer in the U.S. Army, where he had the responsibilities of ADPSSO (Automated Data Processing System Security Officer). Richard Austin, MS, CISSP, MCSE has over 30 years of experience in the IT industry. Before pursuing a career as an independent consultant, he was focused on technology and processes for successfully protecting the 14PB storage area network infrastructure within the global IT organization of a Fortune 25 company. He teaches undergraduate information security courses as a part-time faculty at Kennesaw State University and is an active member of SNIA's Security Technical Working Group as well as a frequent writer and presenter on storage networking security and digital forensics.

Review :
Introduction Chapter 1 - Introduction to Information Security Chapter 2- An Introduction to Networking Chapter 3- Security Policies, Standards, and Planning Chapter 4 - Finding Network Vulnerabilities Chapter 5 - Firewall Planning and Design Chapter 6 - Packet Filtering Chapter 7 - Working with Proxy Servers and Application-Level Firewalls Chapter 8 - Firewall Configuration and Administration Chapter 9 - Encryption and Firewalls Chapter 10 - Authenticating Chapter 11 - Setting Up a Virtual Private Network Chapter 12 - Contingency Planning Chapter 13 - Intrusion Detection and Prevention Systems Chapter 14 - Digital Forensics


Best Sellers


Product Details
  • ISBN-13: 9781435420168
  • Publisher: Cengage Learning, Inc
  • Publisher Imprint: Delmar Cengage Learning
  • Edition: Revised edition
  • Language: English
  • Spine Width: 20 mm
  • Width: 188 mm
  • ISBN-10: 1435420160
  • Publisher Date: 01 Jun 2008
  • Binding: Paperback
  • Height: 232 mm
  • Returnable: N
  • Weight: 780 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Guide to Firewalls and Network Security
Cengage Learning, Inc -
Guide to Firewalls and Network Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Guide to Firewalls and Network Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!