Facebook Twitter Pinterest
EUR 33,26
  • Alle Preisangaben inkl. MwSt.
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Menge:1
Guide To Network Security... ist in Ihrem Einkaufwagen hinzugefügt worden
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Dieses Bild anzeigen

Guide To Network Security (International Edition) (Englisch) Taschenbuch – 1. Oktober 2012


Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Taschenbuch
"Bitte wiederholen"
EUR 33,26
EUR 33,26 EUR 42,90
15 neu ab EUR 33,26 1 gebraucht ab EUR 42,90
click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.



Produktinformation

Produktbeschreibungen

Pressestimmen

1. Introduction to Information Security. 2. Introduction to Networking. 3. Cryptography. 4. Firewall Technologies and Administration. 5. Access Controls and Remote Access. 6. Intrusion Detection and Prevention. 7. Wireless Network Security. 8. Security of Web Applications. 9. Network Vulnerability Assessment. 10. Auditing, Monitoring, and Logging. 11.Contingency Planning and Networking Incident Response. 12. Digital Forensics and eDiscovery.

Über den Autor und weitere Mitwirkende

David Mackey, CISSP, is director of security operations consulting at ArcSight and an adjunct faculty member at the University of Colorado Boulder, where he teaches graduate courses in information security. Mr. Mackey has over 15 years of IT and information security experience and currently leads a group that helps customers build or improve their security intelligence capabilities. Prior to his IT career, Mr. Mackey served as an intelligence specialist in the U.S. Army. He has written a textbook on web security and contributed to a number of additional books and papers. Michael Whitman, Ph.D., CISM, CISSP is a Professor of Information Security at Kennesaw State University, Kennesaw, Georgia, where he is also the Executive Director of the KSU/Coles College of Business Center for Information Security Education. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU's successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CD) awarded by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Information Security Education Journal, and Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, and Curriculum Development, as well as Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print - Principles of Information Security, 5th Ed., Management of Information Security, 5th Ed., Readings and Cases in the Management of Information Security, Volumes I and II, The Hands-On Information Security Lab Manual, 4th Ed., Principles of Incident Response and Disaster Recovery, 2nd Ed., The Guide to Network Security and The Guide to Firewalls and Network Security, 3rd Ed. all from Cengage Learning. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Prior to coming to academia, Dr. Whitman was an officer in the U.S. Army, where he had the responsibilities of ADPSSO (Automated Data Processing System Security Officer). Herbert Mattord, Ph.D., CISM, CISSP completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security & Assurance as well as Information Systems. He and Michael Whitman are the authors of Principles of Information Security, 5th Ed, Management of Information Security, 5th Ed, Readings and Cases in the Management of Information Security, Principles of Incident Response and Disaster Recovery, 2nd Ed, The Guide to Network Security, and The Hands-On Information Security Lab Manual, 4th Ed all from Cengage Learning. Dr. Mattord is an active researcher and author in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where much of the practical knowledge found in this and other textbooks was acquired. Andrew Green, M.S.I.S., is a lecturer of information security and assurance in the CSIS department at Kennesaw State University and a research associate with the KSU Center for Information Security Education and Awareness. He was also one of the principal designers of the Southeast Collegiate Cyberdefense Competition, hosted annually by KSU. Before entering academia full-time, Green worked for 10 years as an information security professional, primarily as a consultant to small and medium-sized businesses, as well as a healthcare IT specialist. In the latter role, he developed and supported transcription interfaces for medical facilities throughout the United States. Green is also a full-time Ph.D. student at Nova Southeastern University, where he is studying information systems with a concentration in information security, as well as the co-author of multiple books published by Course Technology.

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: HASH(0x917550e4) von 5 Sternen 14 Rezensionen
HASH(0x9158d858) von 5 Sternen If you want to sound cool spouting jargon then this book is for you 27. November 2015
Von Bob - Veröffentlicht auf Amazon.com
Format: Taschenbuch
A million factoids, no practical advice.
If you want to sound cool spouting jargon then this book is for you. If you want to secure your network then get a different book.

And disregard anything in this book on Digital Communication as it is ALL rubbish.
"The technologies involved are based on 'Pulse Amplitude Modulation' (PAM), which uses analog frequencies to encode one or more bits, by measuring the height of the signal"
HASH(0x9158d8ac) von 5 Sternen Successfully used as a textbook 11. März 2014
Von KOBAM - Veröffentlicht auf Amazon.com
Format: Taschenbuch
I used this book to teach a Network Security class in 2013. I plan to use it again this fall. The students liked the textbook, the exercises are excellent, and the material while not exhaustive is certainly adequate for an introductory class. The text is written in a manner that encourages students to read it rather than just listening to the lectures. This alone make it a worthwhile textbook. I received the book directly from the publisher.
HASH(0x9158dce4) von 5 Sternen I've paid for an original new book but instead I've ... 30. März 2016
Von garmani lu maw - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I've paid for an original new book but instead I've received a fake copied book. The book was not cut probably in some of the words are missing because improper book binding. This is a fraudulent, I have paid full price for the book and I've received a cheap copied book.
Attached please view one of the page from chapter #10
HASH(0x91590390) von 5 Sternen Good book 12. September 2013
Von kewlx - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I use it for school and it gives you quite a few tips and tricks on security, most of this you can look up but this information gives you a more in depth view of how things work and it is well put together.
HASH(0x91590168) von 5 Sternen Bad author, Good book! 5. September 2014
Von A. Y. - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Mr Whitman, the author, is not a good guy and you can realize it if you email him!!
But as a textbook it is good. Does not have many hands-on instruction and it is more theory fundamentals.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.