They have been tested with care, but are not guaranteed for any particular intent beyond educational purposes.
The programs in this book are for instructional purposes only. Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice. Course Technology, a part of Cengage Learning, is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. Microsoft and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. For your lifelong learning solutions, visit Purchase any of our products at your local college store or at our preferred online store Visit our corporate website at. Locate your local office at: /region Cengage Learning products are represented in Canada by Nelson Education, Ltd. Library of Congress Control Number: 2012949396 ISBN-13: 978-4-1 ISBN-10: 4-8 Course Technology 20 Channel Center Street Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Troeger Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Technology Project Manager: Joe Pliss Media Editor: William Overocker Submit all requests online at /permissions Further permissions questions can be emailed toĮditorial Assistant: Jennifer Wheaton Vice President, Marketing: Jennifer Ann Baker Marketing Director: Deborah Yarnell Production Director: Wendy A. Juliet Steiner For permission to use material from this text or product, No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher.Ĭomputing: Marah Bellegarde For product information and technology assistance, contact us atĬengage Learning Customer & Sales Support, 1-80 © 2014 Course Technology, Cengage Learning ALL RIGHTS RESERVED. Guide to Network Defense and Countermeasures, Third Edition Randy Weaver, Dawn Weaver, Dean Farwood Vice President, Careers & Computing: Dave Garza Executive Editor: Steve Helba Director, Development – Careers & Guide to Network Defense and Countermeasures Third Edition Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). May not be copied, scanned, or duplicated, in whole or in part. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit to search by ISBN#, author, title, or keyword for materials in your areas of interest.Ĭopyright 2012 Cengage Learning. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. Due to electronic rights restrictions, some third party content may be suppressed. This is an electronic version of the print textbook. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls.