- Series: Certification/Training
- Paperback: 512 pages
- Publisher: Pearson IT Certification; 2 edition (November 7, 2013)
- Language: English
- ISBN-10: 0789750945
- ISBN-13: 978-0789750945
- Product Dimensions: 7 x 1.2 x 9 inches
- Shipping Weight: 1.7 pounds (View shipping rates and policies)
- Average Customer Review: 5 customer reviews
- Amazon Best Sellers Rank: #520,928 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Network Defense and Countermeasures: Principles and Practices (2nd Edition) (Certification/Training) 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Order it now.
There is a newer edition of this item:
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
About the Author
Chuck Easttom is a security consultant, author, and trainer. He has authored fourteen other books on programming, Web development, security, and Linux. Chuck holds more than 28 different industry certifications including CISSP, CEH, CHFI, ECSA, CIW Security Analyst, MCSE, MCSA, MCDBA, MCAD, Server+, and more. He has served as a subject matter expert for the Computer Technology Industry Association (CompTIA) in the development or revision of four of their certification tests, including the initial creation of their Security+ certification. He also developed the ECES cryptography certification for the EC Council. Chuck is a frequent guest speaker for computer groups, discussing computer security. You can reach Chuck at his website (www.chuckeasttom.com) or by email at email@example.com.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Something does not make sense about this publication given its copyright date. Without exception, all of the chapter references listed in Appendix A are dated 2004 or before. While no one denies that security has a long history and many security principles are simply timeless, a publication on Network Defenses copyrighted 2014 ought to have a sprinkle of more recent references, especially given the evolution of networking and security threats over the last decade.
Having slammed the book for its dated product examples (there are a few more than just the PIX 515E), I would consider it a nice compilation of introductory info on a range of security topics, including encryption and firewall fundamentals, assessing system security, security standards and more. For someone entering the field of network security it is a reasonable starter, reinforced by exercises and multiple choice questions at the end of each chapter. But for a Security Professional, well, if you forgot your security and networking basics, scan through this book for a refresher.