KEY BENEFIT: Network Defense and Countermeasures fills a void left by other books with complete coverage of a wide range of defense strategies, forms of attacks, and policies related to computer security. KEY TOPICS: This comprehensive volume covers practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, security policies and security standards. For network administrators, network security professionals and security audit professionals.
"synopsis" may belong to another edition of this title.
Chuck Easttom has many years ofpractical experience in all aspects of IT. He holds a Doctor of Science inCyberSecurity and 3 masters degrees (including 1 in applied computer scienceand 1 in systems engineering). He has authored 26 computer science books ( sofar) and is an inventor with fifteen computer science patents, and numerousresearch papers on topics such as digital forensics, cyber warfare, engineeringprocesses, cryptography, and other areas.
He was a subject matter expert forCompTIA in the creation of their Security+, Linux+, and Server+ certificationtests and on the Job Task Analysis team for CEH v8. He created the OSForensicscertification test and course. He currently holds over 40 ITcertifications (A+,Network+, iNet+, Linux+, Server+, MCP, MCAD, MCSA, MCSE,MCDBA,MCTS,MCITP, CEH, CHFI, CISSP, CCFP, ISSAP, and more).
Dr. Easttom is frequently a speaker on computer science related topics,oftenspecifically on computer security and related subjects. In the past he has beena speaker at: Hacker Halted, TakedownCon, Secure World, ISC2Security Congress,Harvard Computer Society, Columbia University ACM chapter, University of Texasat Dallas ACM Chapter, Southern Methodist University Research Colloquium, HakonIndia, Defcon, Enfuse,to name a few. He has spoken on the history of viruses,cryptographic back doors, cryptanalysis, cyber warfare and terrorism, thedetails of the RSA algorithm, forensic report writing, Feistel ciphers,and other computer security topics. He is also a Distinguished Speaker ofthe ACM, as well as a member of the ACM and INCOSE and a Senior Member of theIEEE.
You can find book errata at chuckeasttom.com/errata.htm
You can find his research at chuckeasttom.com/research.htm
You can find out more about the author, inventor, computer scientist atChuckEasttom.com
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Shipping:
US$ 13.08
From United Kingdom to U.S.A.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.01. Seller Inventory # G0131711261I4N00
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00039300099
Quantity: 1 available
Seller: medimops, Berlin, Germany
Condition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Seller Inventory # M00131711261-G
Quantity: 1 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. illustrated edition. 448 pages. 9.50x7.75x0.75 inches. In Stock. Seller Inventory # 0131711261
Quantity: 1 available