Facebook Icon Image Google Plus Icon Image Twitter Icon Image

Network Defense

Perimeter Defense Mechanisms

Network Defense Image

Book details:

Publisher:Delmar Cengage Learning
Category: Course Technology
Posted:May 10 2017
Book format:PDF
Book size:5.73 MB

Book Description:

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification. An organization is only as strong as its weakest link. The same is true in network security. Mis-configurations, outdated software and technical glitches are often the easiest point of entry for a hacker. This book, the third in the series, is designed to teach the potential security practitioner how to harden the network infrastructure, evaluate hardware and software configurations and introduce log analysis, creating a strong foundation for Network Security Troubleshooting, response, and repair.

Download Link:

Related Books:

Algorithms and Models for Network Data and Link Analysis Image

Algorithms and Models for Network Data and Link Analysis

Apr 09 2017 Network data are produced automatically by everyday interactions - social networks, power grids, and links between data sets are a few examples. Such data capture social and economic behavior in a form that can be analyzed using powerful computational tools. This book is a guide to both basic and advanced techniques and algorithms for extracting useful information from network data. The content is organized around 'tasks', grouping the algorithms needed to gather specific types of information and thus answer specific types of questions. Examples include similarity between nodes in a network, p...

Learning Network Forensics Image

Learning Network Forensics

Apr 27 2017 Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book * Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic * Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect * A hands-on guide to help you solve your case with malware forensic methods and network behaviors Who This Book Is For If you are a network administrator, system administrator, information security, or forensics professional and wish t...

Network Coding Image

Network Coding

May 07 2017 Network coding promises to significantly impact the way communications networks are designed, operated, and understood. This book presents a unified and intuitive overview of the theory, applications, challenges, and future directions of this emerging field, and is a must-have resource for those working in wireline or wireless networking. Uses an engineering approach - explains the ideas and practical techniques Covers mathematical underpinnings, practical algorithms, code selection, security, and network management Discusses key topics of inter-session (non-multicast) network coding, lossy...

Conducting Network Penetration and Espionage in a Global Environment Image

Conducting Network Penetration and Espionage in a Global Environment

May 23 2017 When its all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksusing free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middletons decades of experience with ...