Guide to Network Security, International Edition 1e

ISBN-13: 9781133279075 / ISBN-10: 1133279074

Michael E. Whitman - Ph. D., CISM, CISSP, Michael J. Coles College of Business, Kennesaw State University
Herbert J. Mattord - MBA, CISM, CISSP, Michael J. Coles College of Business, Kennesaw State University
David Mackey, University of Colorado Boulder
Andrew Green, M.S.I.S., Michael J. Coles College of Business, Kennesaw State University
512pp
Published by Cengage Learning, ©2013
Available Now
£38.99

GUIDE TO NETWORK SECURITY, International Edition is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY, International Edition is an ideal resource for students who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.

Features

  • In addition to detailed, accurate technical information, the text features a strong emphasis on real-world business situations and the needs and perspective of business managers, preparing students for today''s dynamic IT environment.
  • Each chapter opens with a scenario featuring the same fictional company and its ongoing challenges with network security providing invaluable real-world context for chapter material and demonstrating its relevance for modern professionals.
  • Every chapter concludes with a detailed summary of important terms and concepts, multiple review questions, and activities and exercises providing a range of tools to help students assess their understanding of chapter content, conduct additional research, improve their analytical skills, and prepare them for success in the course and future careers.
  • This versatile text serves equally well as a core resource for introductory or intermediate courses, a supplemental text for courses at any level, or a practical reference for working professionals.

1. Introduction to Information Security.
2. Introduction to Networking.
3. Cryptography.
4. Firewall Technologies and Administration.
5. Access Controls and Remote Access.
6. Intrusion Detection and Prevention.
7. Wireless Network Security.
8. Security of Web Applications.
9. Network Vulnerability Assessment.
10. Auditing, Monitoring, and Logging.
11.Contingency Planning and Networking Incident Response.
12. Digital Forensics and eDiscovery.
{NewFeatures}
{Supplements}
{Quotes}
Michael E. Whitman - Ph. D., CISM, CISSP
Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology.

Herbert J. Mattord - MBA, CISM, CISSP
Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.

David Mackey
David Mackey, CISSP, is director of security operations consulting at ArcSight and an adjunct faculty member at the University of Colorado Boulder, where he teaches graduate courses in information security. Mr. Mackey has over 15 years of IT and information security experience and currently leads a group that helps customers build or improve their security intelligence capabilities. Prior to his IT career, Mr. Mackey served as an intelligence specialist in the U.S. Army. He has written a textbook on web security and contributed to a number of additional books and papers.

Andrew Green, M.S.I.S.
Andrew Green, M.S.I.S., is a lecturer of information security and assurance in the CSIS department at Kennesaw State University and a research associate with the KSU Center for Information Security Education and Awareness. He was also one of the principal designers of the Southeast Collegiate Cyberdefense Competition, hosted annually by KSU. Before entering academia full-time, Green worked for 10 years as an information security professional, primarily as a consultant to small and medium-sized businesses, as well as a healthcare IT specialist. In the latter role, he developed and supported transcription interfaces for medical facilities throughout the United States. Green is also a full-time Ph.D. student at Nova Southeastern University, where he is studying information systems with a concentration in information security, as well as the co-author of multiple books published by Course Technology.