New Guide Explains the Fundamentals of Network Security.
As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets. This book focuses on the key elements of security: confidentiality, integrity, authentication, auditing, and recovery.
You can get there
Whether you're already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies and skills you need to succeed.
With this book, you will be able to:
- Understand basic terminology and concepts related to security
- Utilize cryptography, authentication, authorization and access control to increase your Windows, Unix or Linux network's security
- Recognize and protect your network against viruses, worms, spyware, and other types of malware
- Set up recovery and fault tolerance procedures to plan for the worst and to help recover if disaster strikes
- Detect intrusions and use forensic analysis to investigate the nature of the attacks
Network Security Fundamentals is ideal for both traditional and online courses.
About the author:
Rachelle Reese has been designing and developing technical training courses for over ten years and has written a number of books on programming. She has an MA from San Jose State University. She is also a Microsoft Certified Application Developer (MCAD).
1. Computer and Network Security Principles
2. Network and Server Security
5. Authorization and Access Control
6. Securing Network Transmission
7. Remote Access and Wireless Security
8. Server Roles and Security
9. Protecting Against Malware
10. Ongoing Security Management
11. Fault Tolerance and Disaster Recovery
12. Intrusion Detection and Response
For more information visit http://www.researchandmarkets.com/reports/c73008