Network Security first-stepSecond Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn how hacker attacks work, from start to finish Choose the right security solution for each type of risk Create clear and enforceable security policies, and keep them up to date Establish reliable processes for responding to security advisories Use encryption effectively, and recognize its limitations Secure your network with firewalls, routers, and other devices Prevent attacks aimed at wireless networks No security experience required! Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you!
Tom Thomas is an author, lawyer, entrepreneur, musician, and artist with a deep passion for history, literature, and the arts. A graduate of Syracuse University, where he studied political science and English literature, he later earned his law degree from the same institution. Throughout his career, he has practiced law, invested in commercial real estate, and owned a variety of businesses, from fast food establishments to newspapers. His writing reflects his diverse interests. His debut novel, The Jury is Out, is a gripping legal thriller, while The Lady is a Spy explores the intrigue of the Civil War era, a historical period that fascinates him. His third novel, Forgers, Frauds, and Thieves, delves into the world of art, combining his love of creativity with mystery and deception. Whether in law, business, music, or fiction, Thomas brings a storyteller’s touch to everything he pursues.
Although dated, it is sad to say the author may need to explain why some of the information is in there. I assume it is there for honest, law-abiding citizens to be aware of internet threats, rather than technical college shitheads who clearly have no right working in information technology, or even owning a computer at all based upon their unethical use if such information. There is a huge difference between a child of four thinking a malicious download is a game that will not have an impact on anyone and persons over the age of eighteen misusing computer technology. What is even more troubling are those who teach them to do so. I didn't happen to grow up with a cell phone full of applications that can be used for malicious purpose, furthering the need for parental oversight of persons well into their 60s, exempting myself and others wjo think alike, as I am learning how to both protect myself without the newest tech scam and ensuring thete is no interference to either established systems or the operation of my own personal devices. Unfortunately, being from the Stone Age of computer technology, I have a lot of catching up to do to even understand all the high-tech garble, more specifically how internet security has evolved over time and how to utilize the tools at my disposal to the best of their abilities. After Calculus, I thought finances were hard. Damn was I wrong.