Description

Book Synopsis
As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.

Table of Contents

1 Network Security Principles 1

Introduction 2

1.1 Importance of Computer and Network Security 2

1.2 Underlying Computer and Network Security Concepts 6

1.3 Threats and Countermeasures 11

1.4 Policies and Standards 20

2 Network and Server Security 30

Introduction 31

2.1 Network Protocols Review 31

2.2 Best Practices for Network Security 45

2.3 Securing Servers 49

2.4 Border Security 57

3 Cryptography 74

Introduction 75

3.1 Cryptography Overview 75

3.2 Symmetric Encryption 83

3.3 Asymmetric Encryption 90

3.4 Hashes 93

3.5 Achieving CIA 97

3.6 Public Key Infrastructure (PKI) 99

4 Authentication 118

Introduction 119

4.1 Authentication Overview 119

4.2 Authentication Credentials 125

4.3 Authentication Protocols 131

4.4 Best Practices for Secure Authentication 136

5 Authentication and Access Control 149

Introduction 150

5.1 Access Control Models 150

5.2 Implementing Access Control on Windows Computers 154

5.3 Implementing Access Control on Unix Computers 174

6 Securing Network Transmission 188

Introduction 189

6.1 Analyzing Security Requirements for Network Traffic 189

6.2 Defining Network Perimeters 195

6.3 Data Transmission Protection Protocols 201

7 Remote Access and Wireless Security 221

7.1 Dial-Up Networking 222

7.2 Virtual Private Networks 230

7.3 RADIUS and TACACS 235

7.4 Wireless Networks 239

8 Server Roles and Security 262

Introduction 263

8.1 Server Roles and Baselines 263

8.2 Securing Network Infrastructure Servers 274

8.3 Securing Domain Controllers 289

8.4 Securing File and Print Servers 292

8.5 Securing Application Servers 298

9 Protecting Against Malware 310

9.1 Viruses and Other Malware 311

9.2 Protecting the Workstation 315

9.3 Web Browser Security 323

9.4 Email Security 336

10 Ongoing Security Management 356

Introduction 357

10.1 Managing Updates 357

10.2 Auditing and Logging 366

10.3 Secure Remote Administration 371

11 Disaster Recovery and Fault Tolerance 395

Introduction 396

11.1 Planning for the Worst 396

11.2 Creating a Backup Strategy 407

11.3 Designing for Fault Tolerance 415

12 Intrusion Detection and Forensics 433

Introduction 434

12.1 Intrusion Detection 434

12.2 Honeypots 439

12.3 Forensics 444

Glossary 462

Index 507

Network Security Fundamentals

Product form

£75.52

Includes FREE delivery

RRP £79.50 – you save £3.98 (5%)

Order before 4pm today for delivery by Tue 23 Dec 2025.

A Paperback / softback by Eric Cole, Ronald L. Krutz, James Conley

15 in stock


    View other formats and editions of Network Security Fundamentals by Eric Cole

    Publisher: John Wiley & Sons Inc
    Publication Date: 18/01/2008
    ISBN13: 9780470101926, 978-0470101926
    ISBN10: 047010192X

    Description

    Book Synopsis
    As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.

    Table of Contents

    1 Network Security Principles 1

    Introduction 2

    1.1 Importance of Computer and Network Security 2

    1.2 Underlying Computer and Network Security Concepts 6

    1.3 Threats and Countermeasures 11

    1.4 Policies and Standards 20

    2 Network and Server Security 30

    Introduction 31

    2.1 Network Protocols Review 31

    2.2 Best Practices for Network Security 45

    2.3 Securing Servers 49

    2.4 Border Security 57

    3 Cryptography 74

    Introduction 75

    3.1 Cryptography Overview 75

    3.2 Symmetric Encryption 83

    3.3 Asymmetric Encryption 90

    3.4 Hashes 93

    3.5 Achieving CIA 97

    3.6 Public Key Infrastructure (PKI) 99

    4 Authentication 118

    Introduction 119

    4.1 Authentication Overview 119

    4.2 Authentication Credentials 125

    4.3 Authentication Protocols 131

    4.4 Best Practices for Secure Authentication 136

    5 Authentication and Access Control 149

    Introduction 150

    5.1 Access Control Models 150

    5.2 Implementing Access Control on Windows Computers 154

    5.3 Implementing Access Control on Unix Computers 174

    6 Securing Network Transmission 188

    Introduction 189

    6.1 Analyzing Security Requirements for Network Traffic 189

    6.2 Defining Network Perimeters 195

    6.3 Data Transmission Protection Protocols 201

    7 Remote Access and Wireless Security 221

    7.1 Dial-Up Networking 222

    7.2 Virtual Private Networks 230

    7.3 RADIUS and TACACS 235

    7.4 Wireless Networks 239

    8 Server Roles and Security 262

    Introduction 263

    8.1 Server Roles and Baselines 263

    8.2 Securing Network Infrastructure Servers 274

    8.3 Securing Domain Controllers 289

    8.4 Securing File and Print Servers 292

    8.5 Securing Application Servers 298

    9 Protecting Against Malware 310

    9.1 Viruses and Other Malware 311

    9.2 Protecting the Workstation 315

    9.3 Web Browser Security 323

    9.4 Email Security 336

    10 Ongoing Security Management 356

    Introduction 357

    10.1 Managing Updates 357

    10.2 Auditing and Logging 366

    10.3 Secure Remote Administration 371

    11 Disaster Recovery and Fault Tolerance 395

    Introduction 396

    11.1 Planning for the Worst 396

    11.2 Creating a Backup Strategy 407

    11.3 Designing for Fault Tolerance 415

    12 Intrusion Detection and Forensics 433

    Introduction 434

    12.1 Intrusion Detection 434

    12.2 Honeypots 439

    12.3 Forensics 444

    Glossary 462

    Index 507

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account