Introduction to Security and Network Forensics Front Cover

Introduction to Security and Network Forensics

  • Length: 502 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2011-06-06
  • ISBN-10: 084933568X
  • ISBN-13: 9780849335686
  • Sales Rank: #2901337 (See Top 100 Books)
Description

Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics.

Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including:

  • More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements
  • 60,000 test questions, including for Certified Ethical Hacking and CISSP®
  • 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labs

Rounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats.
Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com.

Table of Contents

Chapter 1: Introduction to Security
Chapter 2: Intrusion Detection Systems
Chapter 3: Encryption
Chapter 4: Authentication, Hashing, and Digital Certificates
Chapter 5: Enhanced Software Security
Chapter 6: Network Security Elements
Chapter 7: Introduction to Risk
Chapter 8: Threat Analysis
Chapter 9: Network Forensics
Chapter 10: Data Hiding and Obfuscation
Chapter 11: Web Infrastructures
Chapter 12: Cloud/Grid Computing

To access the link, solve the captcha.