Электронная книга: Andre Perez «Network Security»
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection. Издательство: "John Wiley&Sons Limited"
ISBN: 9781119043966 электронная книга Купить за 10810.32 руб и скачать на Litres |
Другие книги автора:
Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|
Voice over LTE. EPS and IMS Networks | Voice over LTE (Long Term Evolution) presents the mechanisms put in place in 4G mobile networks for the transportation of IP packets containing voice data and telephone signaling, as well as the… — John Wiley&Sons Limited, электронная книга Подробнее... | электронная книга | ||
Mobile Networks Architecture | This book explains the evolutions of architecture for mobiles and summarizes the different technologies:– 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service)… — John Wiley&Sons Limited, электронная книга Подробнее... | электронная книга | ||
IP, Ethernet and MPLS Networks. Resource and Fault Management | This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource… — John Wiley&Sons Limited, электронная книга Подробнее... | электронная книга | ||
IP, Ethernet and MPLS Networks. Resource and Fault Management | This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource… — John Wiley&Sons Limited, электронная книга Подробнее... | электронная книга | ||
LTE<E Advanced. 4G Network Radio Interface | This book presents the technical characteristics of the two radio network interfaces of mobile 4G, LTE and LTE Advanced, based on Release 8, 9 and 10 of the 3GPP specifications. Points covered… — John Wiley&Sons Limited, электронная книга Подробнее... | электронная книга | ||
VoLTE and ViLTE. Voice and Conversational Video Services over the 4G Mobile Network | This book presents the architecture of two networks that make up the backbone of the telephone service VoLTE and video service ViLTE. The 4G mobile network makes it possible to construct bearers… — John Wiley&Sons Limited, электронная книга Подробнее... | электронная книга |
См. также в других словарях:
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
Network Security Toolkit — NST WUI: Multi Tap Network Packet Capture Developer(s) … Wikipedia
Network Security & Cryptography — is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches… … Wikipedia
Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) … Wikipedia
Network security policy — A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document… … Wikipedia
network security — Defensive measures (hardware or software) used to impose user access restrictions on a network … IT glossary of terms, acronyms and abbreviations