{"id":390,"date":"2013-05-08T03:58:36","date_gmt":"2013-05-08T03:58:36","guid":{"rendered":"http:\/\/examreview.net\/wp\/?p=390"},"modified":"2013-05-08T03:58:36","modified_gmt":"2013-05-08T03:58:36","slug":"intro-to-network-security","status":"publish","type":"post","link":"http:\/\/examreview.net\/wp\/?p=390","title":{"rendered":"Intro to Network Security"},"content":{"rendered":"<p><strong>Essential ClassNotes Intro to Network Security Study Notes, Review Questions and Classroom Discussion Topics 2013<\/strong><\/p>\n<p>Information presented in class often contains the core concepts of the course. Yet, students frequently fail to master the skills of classroom notetaking. Our Essential ClassNotes products provide study notes that are specific and concrete. Review questions and classroom discussion topics are also included to make sure students are truly involved in the ideas and information being presented.\u00a0<br \/>\n\u00a0<br \/>\nBelow shows the TOC:<br \/>\n\u00a0<br \/>\nCONTENT UPDATES\u00a02<br \/>\nABOUT THIS BOOK\u00a02<br \/>\nNETWORK SERVER AND ADDRESSING\u00a03<br \/>\nOVERVIEW OF SERVER OS\u00a03<br \/>\nWINDOWS NETWORKING\u00a09<br \/>\nLINUX NETWORKING\u00a013<br \/>\nSERVER CAPACITY\u00a015<br \/>\nIP ADDRESSING\u00a019<br \/>\nHTTP AND STATE INFORMATION\u00a022<br \/>\nCRYPTOGRAPHY\u00a026<br \/>\nCHAPTER REVIEW QUESTIONS\u00a029<br \/>\nNETWORK INFRASTRUCTURE, PROTOCOLS AND SECURITY THREATS\u00a032<br \/>\nCATEGORIES, DEFINITIONS AND TYPES\u00a032<br \/>\nNETWORK GEARS\u00a035<br \/>\nNETWORK PROTOCOLS\u00a039<br \/>\nLAN MODELS AND INFRASTRUCTURE DESIGN\u00a042<br \/>\nOPEN SYSTEM INTERCONNECT AND THE TCP 4-LAYER MODEL\u00a044<br \/>\nDNS, DHCP AND LDAP\u00a047<br \/>\nACCOUNTS AND PASSWORD MANAGEMENT\u00a049<br \/>\nSECURITY AWARENESS TRAINING\u00a051<br \/>\nMALWARE\u00a053<br \/>\nVIRUSES AND WORMS\u00a054<br \/>\nSPYWARE\u00a055<br \/>\nTROJAN HORSE\u00a056<br \/>\nKEYSTROKE LOGGER\u00a057<br \/>\nSOFTWARE FLAWS\u00a058<br \/>\nSNIFFING, EAVESDROPPING AND FOOTPRINTING\u00a060<br \/>\nDOS AND DDOS\u00a062<br \/>\nSOCIAL ENGINEERING\u00a064<br \/>\nIDENTITY THEFT\u00a066<br \/>\nBACKDOORS AND ROOTKITS\u00a067<br \/>\nOTHER VULNERABILITIES\u00a069<br \/>\nP3P\u00a070<br \/>\nDATABASE SPECIFIC RISKS\u00a071<br \/>\nSECURITY STRATEGIES\u00a074<br \/>\nCONCEALING HARD DISK DATA\u00a077<br \/>\nCHAPTER REVIEW QUESTIONS\u00a079<\/p>\n<p>CreateSpace eStore: <a href=\"https:\/\/www.createspace.com\/4151244\">https:\/\/www.createspace.com\/4151244<\/a><\/p>\n<p><a href=\"http:\/\/examreview.net\/wp\/wp-content\/uploads\/2013\/05\/largeprint.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-173\" alt=\"largeprint\" src=\"http:\/\/examreview.net\/wp\/wp-content\/uploads\/2013\/05\/largeprint.png\" width=\"133\" height=\"37\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Essential ClassNotes Intro to Network Security Study Notes, Review Questions and Classroom Discussion Topics 2013 Information presented in class often&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226,224],"tags":[237,234,236],"class_list":["post-390","post","type-post","status-publish","format-standard","hentry","category-computer-general","category-essential-classnotes","tag-is-security-2","tag-linux","tag-network-security","wpcat-226-id","wpcat-224-id"],"_links":{"self":[{"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/390"}],"collection":[{"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=390"}],"version-history":[{"count":1,"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/390\/revisions"}],"predecessor-version":[{"id":391,"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/390\/revisions\/391"}],"wp:attachment":[{"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/examreview.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}