Guide to Network Security | 1st Edition

Michael E. Whitman/Herbert J. Mattord/David Mackey/Andrew Green, M.S.I.S.
Product cover for Guide to Network Security 1st Edition by Michael E. Whitman/Herbert J. Mattord/David Mackey/Andrew Green, M.S.I.S.
Copyright 2013 | {{checkPublicationMessage('Published', '2012-09-20T00:00:00+0000')}}
Access the eBook {{getPriceWithCurrency(vm.textbookPlatformSelectedOption.price, "$")}} {{getPriceWithCurrency("56.99", "$")}}
ISBN: 9781285501598
Access until June 14, 2025
{{getPriceWithCurrency("56.99", "$")}}
Access until December 11, 2025
{{getPriceWithCurrency("78.49", "$")}}
Buy or Rent the Textbook {{getPriceWithCurrency(vm.textbookPlatformSelectedOption.price, "$")}} {{getPriceWithCurrency("103.95", "$")}}
ISBN: 9780840024220
Buy Paperback : Guide to Network Security ISBN: 9780840024220
{{getPriceWithCurrency("103.95", "$")}}
Not Available
{{getInventoryMessage( vm.textbookPlatformSelectedOption.inventoryCode, 'Published' )}}

About This Product

GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for students who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.