Printer Friendly

New Guide Explains the Fundamentals of Network Security.

DUBLIN, Ireland -- Research and Markets ( has announced the addition of Wiley Pathways Network Security Fundamentals 1st Edition to their offering.

As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets. This book focuses on the key elements of security: confidentiality, integrity, authentication, auditing, and recovery.

You can get there

Whether you're already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies and skills you need to succeed.

With this book, you will be able to:

- Understand basic terminology and concepts related to security

- Utilize cryptography, authentication, authorization and access control to increase your Windows, Unix or Linux network's security

- Recognize and protect your network against viruses, worms, spyware, and other types of malware

- Set up recovery and fault tolerance procedures to plan for the worst and to help recover if disaster strikes

- Detect intrusions and use forensic analysis to investigate the nature of the attacks

Network Security Fundamentals is ideal for both traditional and online courses.

About the author:

Rachelle Reese has been designing and developing technical training courses for over ten years and has written a number of books on programming. She has an MA from San Jose State University. She is also a Microsoft Certified Application Developer (MCAD).

1. Computer and Network Security Principles

2. Network and Server Security

3. Cryptography

4. Authentication

5. Authorization and Access Control

6. Securing Network Transmission

7. Remote Access and Wireless Security

8. Server Roles and Security

9. Protecting Against Malware

10. Ongoing Security Management

11. Fault Tolerance and Disaster Recovery

12. Intrusion Detection and Response

For more information visit
COPYRIGHT 2007 Business Wire
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2007, Gale Group. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Business Wire
Date:Oct 30, 2007
Previous Article:'Fibre Optic Essentials' is the Book That Provides Easy Reading and Understanding of Fibre Optics for Both Professionals and Laymen.
Next Article:Steel Partners Submits Proposal to Acquire Point Blank Solutions.

Related Articles
Los Angeles County Selects Check Point for Data Security.
Alert Logic Signs Four New Managed Hosting and Service Provider Partners.
Cymphonix's Version 8 Secure Web Gateway Appliance Includes HTTPS/SSL Content Filtering and Unparalleled Content Filter Avoidance Controls for SMB...
Farm Business Communications (FBC).
The capital market crackup: to shoot yourself in the foot is bad enough for U.S. capital markets; so why are we reloading and firing again?
Lumigent Technologies.
Tekelec Deploys Enhanced Business Intelligence Solution.
First Coverage Welcomes Soleil Securities Group as 200th Sell-Side Participant on its Coverage Optimization Platform.
Network Security Fundamentals Project Manual Helps Readers Apply Textbook Concepts and Skills in a Practical Way.

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters