New Guide Explains the Fundamentals of Network Security.DUBLIN, Ireland -- Research and Markets (http://www.researchandmarkets.com/reports/c73008) has announced the addition of Wiley Pathways Network Security Fundamentals 1st Edition to their offering.
As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets. This book focuses on the key elements of security: confidentiality, integrity, authentication (1) Verifying the integrity of a transmitted message. See message integrity, e-mail authentication and MAC.
(2) Verifying the identity of a user logging into a network. , auditing, and recovery.
You can get there
Whether you're already working and looking to expand your skills in the computer networking
Computer networking is the engineering discipline concerned with communication between computer systems or devices. and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies A core competency is something that a firm can do well and that meets the following three conditions specified by Hamel and Prahalad (1990):
With this book, you will be able to:
- Understand basic terminology and concepts related to security
- Utilize cryptography, authentication, authorization and access control to increase your Windows, Unix or Linux network's security
- Recognize and protect your network against viruses, worms, spyware, and other types of malware (MALicious softWARE) Software designed to destroy, aggravate and otherwise make life unhappy. See crimeware, virus, worm, logic bomb, macro virus and Trojan.
- Set up recovery and fault tolerance See fault tolerant.
(architecture) fault tolerance - 1. The ability of a system or component to continue normal operation despite the presence of hardware or software faults. This often involves some degree of redundancy.
2. procedures to plan for the worst and to help recover if disaster strikes
- Detect intrusions and use forensic analysis to investigate the nature of the attacks
Network Security Fundamentals is ideal for both traditional and online courses.
About the author:
Rachelle Reese has been designing and developing technical training courses for over ten years and has written a number of books on programming. She has an MA from San Jose San Jose, city, United States
San Jose (sănəzā`, săn hōzā`), city (1990 pop. 782,248), seat of Santa Clara co., W central Calif.; founded 1777, inc. 1850. State University. She is also a Microsoft Certified Application Developer (MCAD MCAD Microsoft Certified Application Developer
MCAD Mechanical Computer Aided Design
MCAD Medium-Chain Acyl-CoA Dehydrogenase (inherited metabolic disease)
MCAD Minneapolis College of Art and Design ).
1. Computer and Network Security Principles
2. Network and Server Security
5. Authorization and Access Control
6. Securing Network Transmission
7. Remote Access and Wireless Security
8. Server Roles and Security
9. Protecting Against Malware
10. Ongoing Security Management
11. Fault Tolerance and Disaster Recovery
12. Intrusion Detection See IDS and IPS. and Response
For more information visit http://www.researchandmarkets.com/reports/c73008