Buy Used
+ £2.80 UK delivery
Used: Good | Details
Condition: Used: Good
Trade in your item
Get a £0.34
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Network Security: The Complete Reference (Osborne Complete Reference Series) Paperback – 1 Nov 2003

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"
£42.45 £2.91

There is a newer edition of this item:

Trade In this Item for up to £0.34
Trade in Network Security: The Complete Reference (Osborne Complete Reference Series) for an Amazon Gift Card of up to £0.34, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

The Most Authoritative Volume Available on Network Security

Includes a Security Dictionary and contributions from topical experts!

The solution to today's computer system security ills will only be solved when organizations obtain and implement a network security program. This comprehensive resource provides all the information necessary to formulate strategies to reach that goal. Learn to plan, implement, and maintain a secure network, and protect confidential information such as customer lists, credit card numbers, and stockholder names, and addresses. Prevent the attack or theft of specialized information such as trade secrets, formulas, production details, and other intellectual property. Network Security: The Complete Reference provides critical strategies, concepts, techniques, and solutions to keep your network system secure.

  • Learn what it takes to build a solid security architecture
  • Manage and control all access points to your digital data
  • Anticipate incidents using risk analysis, threat definition, and vulnerability assessment
  • Secure confidentiality, integrity, privacy, and availability
  • Understand how HIPAA, Gramm-Leach-Bliley and other security legislation affects you
  • Learn about a California law that requires compliance from all organizations, no matter what state they reside in

Technical Experts:

  • Dr. Nick Efford & Steve Wright, Windows .NET Security
  • Ken Pfeil, Physical Security
  • Ben Rothke, Operating System Security
  • Roger A. Grimes, Intrusion Detection
  • Anil Desai & Rob Kraft, Database Security
  • Ole Drews Jensen, Router & Device Security
  • Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
  • Michael Howard, Secure Software
  • Thaddeus Fortenberry & Eric Maiwald, VPN Security
  • Michael O'Dea, Windows Security
  • Brian Buege, Michael Judd & Jim Keogh, J2EE Security
  • Bernard Chapple, Disaster Recovery
  • Glen Carty & Steve Thomas, Novell Security
  • Christian Genetski & Curtis Karnow, Legal Issues
  • Curtis W. Rose, Incident Response & Computer Forensics
  • Thomas Knox & Robert Clugston, Linux/UNIX Security
  • Barak Weicheselbaum, Application Security

About the Author

Roberta Bragg (CISSP, MCSE: Security; Security+, ETI Client Server, Certified Technical Trainer, IBM Certified Trainer, DB2-UDB, Citrix Certified Administrator) has been a Security Advisor columnist for Microsoft Certified Professional Magazine for five years, is a Security Expert for, and writes for the “SecurityWatch” newsletter, which has more than 55,000 subscribers. Roberta designed, planned, produced, and participated in the first Windows Security Summit, held in Seattle, Washington, in 2002. In September and October of 2002, Roberta was an instructor for four sessions of SANS Gold Standard Windows 2000 Training. Roberta has participated in numerous security audits and is a security evangelist traveling all over the world consulting, assessing, and training on network and Windows security. Roberta has served as adjunct faculty at Seattle Pacific University and at Johnson County Community College teaching courses on Windows 2000 Security Design and Network Security Design. Mark Rhodes-Ousley (CISSP) has been a practicing security professional for more than ten years. Mark has advised, designed, and installed security technologies and policies for dozens of companies, including Fortune 500 companies, large, medium-sized, and many small companies. All this experience with companies in different stages of growth leads to a unique perspective on how to manage security for a growing company—where to begin, what to do when moving forward, and how to plan for future growth. Mark holds certifications from the International Information Systems Security Certification Consortium, known as (ISC)2, Cisco Systems, Security Dynamics, Raptor Systems, Hewlett Packard, and Digital Equipment Corporation, along with a Bachelor degree in Applied Mathematics and Electrical Engineering from the University of California, San Diego (UCSD).Keith Strassberg (CPA, CISSP) is an independent security consultant with more than seven years of experience in information security. Most recently, he worked as a senior security engineer for a mid-sized technology consulting company. Keith’s professional experiences cover all facets of information security, including, but not limited to, designing and deploying secure infrastructures, implementing firewalls and intrusion detection systems, performing computer forensic investigations, developing policies and procedures, and performing vulnerability testing.

Inside This Book (Learn More)
First Sentence
Security is not just about keeping people out of your network. Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 11 reviews
5 of 5 people found the following review helpful
Excellent network security reference 24 Oct. 2005
By Gary - Published on
Format: Paperback
A true bible for network security. Also covered are items on risk management, network security policies etc. The book includes simple to advanced topics on network security
5 of 6 people found the following review helpful
Excellent Network Security Book 1 Mar. 2004
By William W Richards - Published on
Format: Paperback
"Network Security: The complete Reference" is an excellent book for security and network professionals alike. This book comes very close to living up to its ambitious title. It covers almost everything. Network architecture, operating system security, risk assessment, security polices and writing secure code and everything between are covered. This is an excellent reference book for all security conscious IT professionals.
3 of 3 people found the following review helpful
Definite keeper 27 Feb. 2008
By Wierd_Beard - Published on
Format: Paperback
I bought this book for a class but will definitely keep it afterwards. A lot of well organized information on computer security, from policy to implementation.
7 of 10 people found the following review helpful
Accessibly teaches end-to-end network security concepts 4 Jun. 2004
By Midwest Book Review - Published on
Format: Paperback
The collaborative effort of computer security experts Roberta Bragg, Mark Rhodes-Ousley, & Keith Strassberg, Network Security: The Complete Reference comprehensively and accessibly teaches end-to-end network security concepts and techniques, and includes detailed information on just how to design a truly comprehensive and effective security defense model. Plus, Network Security: The Complete Reference discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
5 of 7 people found the following review helpful
Very complete book! 12 Feb. 2005
By Camilo Beltran - Published on
Format: Paperback
I'm working in Information Security, and I was looking for a good security book, fortunately my decision was the best. This book is very complete and not only explain the concepts of network security but Information Security in the general context. The topics are technical as well as administrative. Explain how the security should be implemented and assessed or audited. I really improved my knowledge and my productivity in my job.
Were these reviews helpful? Let us know