Introduction to Security and Network Forensics
Autor William J. Buchananen Limba Engleză Hardback – 6 iun 2011
Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including:
- More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements
- 60,000 test questions, including for Certified Ethical Hacking and CISSP®
- 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labs
Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com.
Preț: 396.43 lei
Preț vechi: 430.90 lei
-8% Nou
Puncte Express: 595
Preț estimativ în valută:
75.89€ • 78.89$ • 62.92£
75.89€ • 78.89$ • 62.92£
Carte disponibilă
Livrare economică 16-30 ianuarie 25
Livrare express 01-07 ianuarie 25 pentru 52.48 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849335686
ISBN-10: 084933568X
Pagini: 502
Ilustrații: 8 Tables, black and white; 307 Illustrations, black and white
Dimensiuni: 178 x 254 x 27 mm
Greutate: 1.07 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 084933568X
Pagini: 502
Ilustrații: 8 Tables, black and white; 307 Illustrations, black and white
Dimensiuni: 178 x 254 x 27 mm
Greutate: 1.07 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
UndergraduateCuprins
Introduction to Security. Intrusion Detection Systems. Encryption. Authentication, Hashing, and Digital Certificates. Enhanced Software Security. Network Security Elements. Introduction to Risk. Threat Analysis. Network Forensics. Data Hiding and Obfuscation. Web Infrastructures. Cloud/Grid Computing.
Notă biografică
Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, UK. He currently leads the Centre for Distributed Computing and Security, along with leading the Scottish Centre of Excellence in Security and Cybercrime. He works in the areas of security, e-Crime, intrusion detection systems, digital forensics, e-Health, mobile computing, agent-based systems, and simulation. Professor Buchanan has one of the most extensive academic sites in the World, and is involved in many areas of novel teaching in computing, including a widely-used network simulation package.
He has published over 25 academic books, and over 120 academic research papers, along with awards for excellence in knowledge transfer. Presently he is working with a range of industrial/domain partners, including within law enforcement, health care, and finance. Along with this he has been involved in university start-ups and in generating novel methods within security and digital forensics.
He has published over 25 academic books, and over 120 academic research papers, along with awards for excellence in knowledge transfer. Presently he is working with a range of industrial/domain partners, including within law enforcement, health care, and finance. Along with this he has been involved in university start-ups and in generating novel methods within security and digital forensics.
Descriere
Explaining the fundamentals of cyber security and digital forensics, this text covers the basic principles of intrusion detection systems, encryption, and authentication. Beginning with an overview of general concepts in security, it addresses hashing and digital certificates, enhanced software security, and network security. It introduces the concept of risk, threat analysis, and network forensics and covers data hiding, obfuscation, web infrastructures, and cloud and grid computing. Simulators, test questions, labs, and online lectures and related material are made available on the book’s website.