Электронная книга: Andre Perez «Network Security»
![]() |
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection. Издательство: "John Wiley&Sons Limited"
ISBN: 9781119043966 электронная книга Купить за 10810.32 руб и скачать на Litres |
Другие книги схожей тематики:
Автор | Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|---|
Eric Cole | Network Security Bible | The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest… — John Wiley&Sons Limited (USD), Подробнее... | 4682.19 | электронная книга | |
Matthew Strebe | Network Security Foundations. Technology Fundamentals for IT Success | The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next… — John Wiley&Sons Limited (USD), Подробнее... | 1625.34 | электронная книга | |
Nicolas Larrieu | Risk Propagation Assessment for Network Security. Application to Airport Communication Network Design | The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool… — John Wiley&Sons Limited, Подробнее... | 6100.4 | электронная книга | |
Michael Gregg | The Network Security Test Lab. A Step-by-Step Guide | The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement… — John Wiley&Sons Limited, Подробнее... | 3860.83 | электронная книга | |
Jie Wang | Introduction to Network Security. Theory and Practice | Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash… — John Wiley&Sons Limited, Подробнее... | 10038.89 | электронная книга | |
Greg Holden | Guide to Firewalls and Network Security: Intrusion Detection and VPNs | This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an… — Course Technology, Подробнее... | 2003 | 5649.3 | бумажная книга |
Xiaodong Lin | Vehicular Ad Hoc Network Security and Privacy | This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s… — John Wiley&Sons Limited, Подробнее... | 9652.07 | электронная книга | |
Matthew Monte | Network Attacks and Exploitation. A Framework | Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and… — John Wiley&Sons Limited, Подробнее... | 3475.48 | электронная книга | |
Guenter Schaefer | Security in Fixed and Wireless Networks | Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the… — John Wiley&Sons Limited, Подробнее... | 9265.99 | электронная книга | |
Khaldoun Agha Al | Network Coding | Network coding, a relatively new area of research, has evolved from the theoretical level to become a tool used to optimize the performance of communication networks– wired, cellular, ad hoc, etc… — John Wiley&Sons Limited, Подробнее... | 10848.59 | электронная книга | |
Stuart Jacobs | Security Management of Next Generation Telecommunications Networks and Services | This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support… — John Wiley&Sons Limited, Подробнее... | 10269.66 | электронная книга | |
Ric Messier | Network Forensics | Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of… — John Wiley&Sons Limited (USD), Подробнее... | 3902.37 | электронная книга | |
Jessey Bullock | Wireshark for Security Professionals. Using Wireshark and the Metasploit Framework | Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is… — John Wiley&Sons Limited (USD), Подробнее... | 3577.17 | электронная книга | |
John Chirillo | Hack Attacks Testing. How to Conduct Your Own Security Audit | Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the… — John Wiley&Sons Limited (USD), Подробнее... | 3251.98 | электронная книга |
Look at other dictionaries:
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
network security — Defensive measures (hardware or software) used to impose user access restrictions on a network … IT glossary of terms, acronyms and abbreviations
Network Security Toolkit — NST WUI: Multi Tap Network Packet Capture Developer(s) … Wikipedia
Network Security & Cryptography — is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches… … Wikipedia
Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) … Wikipedia
Network security policy — A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document… … Wikipedia
TriGeo Network Security — Infobox Company company name = TriGeo Network Security company company type = Private company slogan = You can t protect what you can t see™ foundation = 2001 location city = Post Falls, Idaho location country = USA locations = 1 key people =… … Wikipedia
EC-Council Network Security Administrator — The EC Council Network Security Administrator (ENSA) is a professional certification provided by the International Council of Electronic Commerce Consultants.The Network Security Administrator is a prerequisite for the EC Council CEH… … Wikipedia
L-3 Network Security — Infobox Company type = Subsidiary of Symantec foundation = United States location = United States industry = Computers parent = SymantecL 3 Network Security is a network security company in the United States. It was acquired by Symantec on… … Wikipedia
Arkoon Network Security — Création 2000 Forme juridique Société anonyme à Directoire et Conseil de surveillance Action Euronext Alternext : ALARK … Wikipédia en Français
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia