Guide to Firewalls and Network Security

Author:   Michael Whitman ,  Herbert Mattord ,  Greg Holden ,  Richard Austin
Publisher:   Cengage Learning, Inc
Edition:   2nd Revised edition
ISBN:  

9781435420168


Pages:   520
Publication Date:   01 June 2008
Format:   Paperback
Availability:   Out of stock   Availability explained


Our Price $332.51 Quantity:  
Add to Cart

Share |

Guide to Firewalls and Network Security


Add your own review!

Overview

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.

Full Product Details

Author:   Michael Whitman ,  Herbert Mattord ,  Greg Holden ,  Richard Austin
Publisher:   Cengage Learning, Inc
Imprint:   Delmar Cengage Learning
Edition:   2nd Revised edition
Dimensions:   Width: 18.80cm , Height: 2.00cm , Length: 23.20cm
Weight:   0.780kg
ISBN:  

9781435420168


ISBN 10:   1435420160
Pages:   520
Publication Date:   01 June 2008
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   Out of stock   Availability explained

Table of Contents

Reviews

Introduction Chapter 1 - Introduction to Information Security Chapter 2- An Introduction to Networking Chapter 3- Security Policies, Standards, and Planning Chapter 4 - Finding Network Vulnerabilities Chapter 5 - Firewall Planning and Design Chapter 6 - Packet Filtering Chapter 7 - Working with Proxy Servers and Application-Level Firewalls Chapter 8 - Firewall Configuration and Administration Chapter 9 - Encryption and Firewalls Chapter 10 - Authenticating Chapter 11 - Setting Up a Virtual Private Network Chapter 12 - Contingency Planning Chapter 13 - Intrusion Detection and Prevention Systems Chapter 14 - Digital Forensics


Author Information

Greg Holden is the author of more than 35 books on Internet- and computer-related topics, including the Web design applications Microsoft FrontPage and Macromedia Dreamweaver. He also does Web development for the design firm NewCor Group. He helped design recruitment literature and course catalogs for the University of Chicago. He lives in Chicago with his two teenage daughters and assorted birds, fish, and other pets. Herbert Mattord, Ph.D., CISM, CISSP completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security & Assurance as well as Information Systems. He and Michael Whitman are the authors of Principles of Information Security, 5th Ed, Management of Information Security, 5th Ed, Readings and Cases in the Management of Information Security, Principles of Incident Response and Disaster Recovery, 2nd Ed, The Guide to Network Security, and The Hands-On Information Security Lab Manual, 4th Ed all from Cengage Learning. Dr. Mattord is an active researcher and author in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where much of the practical knowledge found in this and other textbooks was acquired. Michael Whitman, Ph.D., CISM, CISSP is a Professor of Information Security at Kennesaw State University, Kennesaw, Georgia, where he is also the Executive Director of the KSU/Coles College of Business Center for Information Security Education. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU's successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CD) awarded by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Information Security Education Journal, and Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, and Curriculum Development, as well as Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print - Principles of Information Security, 5th Ed., Management of Information Security, 5th Ed., Readings and Cases in the Management of Information Security, Volumes I and II, The Hands-On Information Security Lab Manual, 4th Ed., Principles of Incident Response and Disaster Recovery, 2nd Ed., The Guide to Network Security and The Guide to Firewalls and Network Security, 3rd Ed. all from Cengage Learning. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Prior to coming to academia, Dr. Whitman was an officer in the U.S. Army, where he had the responsibilities of ADPSSO (Automated Data Processing System Security Officer). Richard Austin, MS, CISSP, MCSE has over 30 years of experience in the IT industry. Before pursuing a career as an independent consultant, he was focused on technology and processes for successfully protecting the 14PB storage area network infrastructure within the global IT organization of a Fortune 25 company. He teaches undergraduate information security courses as a part-time faculty at Kennesaw State University and is an active member of SNIA's Security Technical Working Group as well as a frequent writer and presenter on storage networking security and digital forensics.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List