Home > Store

Network Defense and Countermeasures: Principles and Practices, 3rd Edition

Network Defense and Countermeasures: Principles and Practices, 3rd Edition

eBook (Watermarked)

  • Your Price: $54.40
  • List Price: $64.00
  • Estimated Release: Apr 19, 2018
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2019
  • Dimensions: 7" x 9-1/8"
  • Pages: 550
  • Edition: 3rd
  • eBook (Watermarked)
  • ISBN-10: 0-13-489306-9
  • ISBN-13: 978-0-13-489306-8

Network Defense and Countermeasures: Principles and Practices, Third Edition is designed to be the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to network defense. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, Ransomware, malware, security policies and security standards. Unlike many other authors, however, he also fully addresses more specialized issues, including cryptrography, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates.

Sample Content

Table of Contents

Chapter 1: Introduction to Network Security
Chapter 2: Types of Attacks
Chapter 3: Fundamentals of Firewalls
Chapter 4: Firewall Practical Applications
Chapter 5: Intrusion Detection Systems
Chapter 6: Encryption Fundamentals
Chapter 7: Virtual Private Networks
Chapter 8: Operating System Hardening
Chapter 9: Defending Against Virus Attacks
Chapter 10: Defending against Trojan Horses, Spyware, and Adware
Chapter 11: Security Policies
Chapter 12: Assessing System Security
Chapter 13: Security Standards
Chapter 14: Physical Security and Disaster Recovery
Chapter 15: Techniques Used by Attackers
Chapter 16: Introduction to Forensics
Chapter 17: Cyber Terrorism
Appendix A: References


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership