Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.
Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.
Technology impacts every aspect of life and choices are endless. As a college student, you need to know how to evaluate devices, choose apps, maintain a compelling online reputation, and lock down digital security. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2018, COMPREHENSIVE goes beyond the intuitive "how-to" of apps and social media to delve into the broad concepts that are guiding current technologies such as self-driving cars, virtual reality, file sharing torrents, encrypted communications, photo forensics, and the Internet of Things. Numerous illustrations and interactive features in this complete book make mastering technical topics a breeze with a learning path that is structured with you, today's busy student, in mind. This edition offers an insightful overview of what every college student should know about using technology to complete your education, launch a successful career, and engage in issues that shape today's world.
Preparing for a future in IT? ETHICS IN INFORMATION TECHNOLOGY, 6E provides an understanding of the legal, ethical, and societal implications of information technology that you'll need as a successful IT professional. Examine ethical situations in IT and review practical advice for addressing common issues as you study professional codes of ethics, cyberattacks and cybersecurity, security risk assessment, privacy, electronic surveillance, and freedom of expression. You also review Internet censorship, protection of intellectual property, ethical decisions in software systems, IT's impact on society, social networking, and ethics of IT corporations. This book provides a thorough foundation for addressing ethical issues in today's workplace. Business vignettes, Critical-Thinking exercises, thought-provoking Cases and decision-making features prepare you to make key business decisions.
Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.