A must-have, hands-on guide for working in the cybersecurity profession. Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture.
Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.
Emphasizing both the fundamental principles as well as the critical role of performance in driving protocol and network design, it explores in detail all the critical technical areas in data communications, wide-area networking, local area networking, and protocol design.
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Routing TCP/IP, Volume II, Second Edition covers TCP connections, message states, path attributes, interior routing protocol interoperation, neighbor connections, and much more. The authors present crucial knowledge for every professional who wants to manage routers to support network growth and change. The routing and switching techniques they cover are fundamental to all modern networks, and form the foundation of all CCIE tracks - making this book an outstanding resource for those seeking to earn Cisco's elite CCIE credential.