"Network and System Security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authorsOCO respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem-solving techniques, enhancing the readerOCOs grasp of the material and ability to implement practical solutions
This book reviews current topics in Network Security including IDS, IPS, Cloud security, Unix/Linux OS Security, Internet and Intranet security, LAN and NID/HID, Wireless, Cellular, RFID and a brief chapter on Optical Wireless security. The chapters are not strongly edited and the book suffers for it. Each chapter is written by a different technical team and so reads fairly disjointed. Some chapters get in the weeds technically and could have been better generalized as a whole. There are several editing mistakes as well, i.e. a statement being completely false / reversed from what it should state. Even so, it is a good intro to network security topics if you can get past the inconsistencies.
If I didn't have to read this book for school, I wouldn't. This book is a series of articles written by various people from around 8 to 10 years ago. This book references "current technologies", such as Windows XP and Vista, and the new revolution! of Siri in the recent iphone 4. Most of the graphs are from 2011 and many references are from 2005-2008. This is a cute book to skim through and see where we've come but should not be used as a text book for a network security class. Its completely obsolete.