Network Perimeter Security

Network Perimeter Security

Building Defense In-depth

eBook - 2004
Rate this:
Taylor
& Francis Publishing

It's a national epidemic and an international conspiracy. Drugs have infested our society with a vengeance, making the drug enforcement agent a central figure in the war on drugs. International training teams of the U.S. Drug Enforcement Administration (DEA) have traditionally taught the special skills required by all drug agents. Until now, there has never been a book for public consumption devoted strictly to this specialized field of criminal investigation.

Global Drug Enforcement: Practical Investigative Techniques provides basic and advanced methods for conducting modern drug investigations. With coverage of source countries, drug identification, conspiracy investigations, clandestine laboratories, drug intelligence, and money laundering, the book includes the topics that every detective assigned to a drug investigation unit must know. The chapter on drug identification discusses the drugs that all law enforcement officers are likely to encounter including heroin, marijuana, cocaine, methamphetamine, PCP, and the emerging club drugs of Ecstasy, GHB, and Ketamine. A glossary of common terms used in drug enforcement and chapters on the nexus between drugs and terrorism provide additional insight.

Based on the training and experiences of a recently retired Supervisory Special Agent of the DEA who was a former instructor for DEA's Office of Training at the FBI Academy, this book provides domestic and international agencies with a comprehensive reference on contemporary drug enforcement. It greatly expands on many of the topics that DEA employees receive in their training and covers the areas that investigators need to understand in order to conduct safe and effective drug operations.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.

Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process.

Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.

Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process.

Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.


CRC Press
It's a national epidemic and an international conspiracy. Drugs have infested our society with a vengeance, making the drug enforcement agent a central figure in the war on drugs. International training teams of the U.S. Drug Enforcement Administration (DEA) have traditionally taught the special skills required by all drug agents. Until now, there has never been a book for public consumption devoted strictly to this specialized field of criminal investigation.Global Drug Enforcement: Practical Investigative Techniques provides basic and advanced methods for conducting modern drug investigations. With coverage of source countries, drug identification, conspiracy investigations, clandestine laboratories, drug intelligence, and money laundering, the book includes the topics that every detective assigned to a drug investigation unit must know. The chapter on drug identification discusses the drugs that all law enforcement officers are likely to encounter including heroin, marijuana, cocaine, methamphetamine, PCP, and the emerging club drugs of Ecstasy, GHB, and Ketamine. A glossary of common terms used in drug enforcement and chapters on the nexus between drugs and terrorism provide additional insight. Based on the training and experiences of a recently retired Supervisory Special Agent of the DEA who was a former instructor for DEA's Office of Training at the FBI Academy, this book provides domestic and international agencies with a comprehensive reference on contemporary drug enforcement. It greatly expands on many of the topics that DEA employees receive in their training and covers the areas that investigators need to understand in order to conduct safe and effective drug operations.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process. Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.

Book News
A manual for criminal justice majors, federal agents, police officers, detectives newly assigned to a drug unit, and lawyers. It covers the fundamentals of drug investigation, including drug identification, undercover operations, and the handling of confidential informants, as well as more complex cases, discussing conspiracy investigations, clandestine laboratories, intelligence, and money laundering. The author is a retired special agent of the US Drug Enforcement Administration who was the agent-in-charge of the DEA's office in Karachi, Pakistan; he has taught courses in topics including conspiracy investigations, drug smuggling, and informant management to trainees at the FBI Academy in Quantico, VA. Annotation (c) Book News, Inc., Portland, OR (booknews.com)
Suitable for both novice and experienced network administrators, this guide explains how to evaluate network security needs, develop a company security policy, and create a budget based on that policy. Riggs (affiliation not cited) also describes various security tools such as firewalls and cryptography and outlines the testing process. He does not extensively cover any particular technology or provide detailed configuration steps for each product. The volume does not contain bibliographical references, Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)

Publisher: Boca Raton : Auerbach Publications, ©2004
ISBN: 9780203508046
0203508041
9780849316289
0849316286
9781466525238
1466525231
9781135501594
1135501599
9781135501631
1135501637
9781135501648
1135501645
0849316286
Characteristics: 1 online resource (ix, 410 pages) : illustrations
data file,rda

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Subject Headings

  Loading...

Find it at SSFPL

  Loading...
[]
[]
To Top