gogo
Amazon cover image
Image from Amazon.com

Guide to network security / Michael E. Whitman ... [et al.].

Contributor(s): Material type: TextTextPublication details: [Boston, Mass.?] : Course Technology Cengage Learning, c2013.Edition: International edDescription: xxii, 554 p. : ill. ; 24 cmISBN:
  • 9781133279075 (pbk.) :
  • 1133279074
  • 9781133279075
Subject(s): DDC classification:
  • 005 WHI
LOC classification:
  • TK5105.59
Contents:
1.Introduction to information security -- 2.Introduction to networking -- 3.Cryptography -- 4.Firewall technologies and administration -- 5.Network authentication and remote access uinsg VPN -- 6.Network monitoring and intrusion detection and prevention systems -- 7.Wireless network security -- 8.Security of web applications -- 9.Network vulnerability assessment -- 10.Auditing, monitoring, and logging -- 11.Contingency planning and networking incident response -- 12.Digital forensics.
Summary: This wide-ranging text provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Long Loan TUS: Midlands, Main Library Athlone General Lending 005 WHI (Browse shelf(Opens below)) 1 Available 222686

Includes bibliographical references and index.

1.Introduction to information security -- 2.Introduction to networking -- 3.Cryptography -- 4.Firewall technologies and administration -- 5.Network authentication and remote access uinsg VPN -- 6.Network monitoring and intrusion detection and prevention systems -- 7.Wireless network security -- 8.Security of web applications -- 9.Network vulnerability assessment -- 10.Auditing, monitoring, and logging -- 11.Contingency planning and networking incident response -- 12.Digital forensics.

This wide-ranging text provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions.

Powered by Koha