Электронная книга: Andre Perez «Network Security»

Network Security

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Издательство: "John Wiley&Sons Limited"

ISBN: 9781119043966

электронная книга

Купить за 10810.32 руб и скачать на Litres

Другие книги автора:

КнигаОписаниеГодЦенаТип книги
Voice over LTE. EPS and IMS NetworksVoice over LTE (Long Term Evolution) presents the mechanisms put in place in 4G mobile networks for the transportation of IP packets containing voice data and telephone signaling, as well as the… — John Wiley&Sons Limited, электронная книга Подробнее...7878.89электронная книга
Mobile Networks ArchitectureThis book explains the evolutions of architecture for mobiles and summarizes the different technologies:– 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service)… — John Wiley&Sons Limited, электронная книга Подробнее...11316.87электронная книга
IP, Ethernet and MPLS Networks. Resource and Fault ManagementThis book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource… — John Wiley&Sons Limited, электронная книга Подробнее...11316.87электронная книга
IP, Ethernet and MPLS Networks. Resource and Fault ManagementThis book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource… — John Wiley&Sons Limited, электронная книга Подробнее...11196.4электронная книга
LTE<E Advanced. 4G Network Radio InterfaceThis book presents the technical characteristics of the two radio network interfaces of mobile 4G, LTE and LTE Advanced, based on Release 8, 9 and 10 of the 3GPP specifications. Points covered… — John Wiley&Sons Limited, электронная книга Подробнее...9265.99электронная книга
VoLTE and ViLTE. Voice and Conversational Video Services over the 4G Mobile NetworkThis book presents the architecture of two networks that make up the backbone of the telephone service VoLTE and video service ViLTE. The 4G mobile network makes it possible to construct bearers… — John Wiley&Sons Limited, электронная книга Подробнее...10810.32электронная книга

См. также в других словарях:

  • Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …   Wikipedia

  • Network Security Toolkit — NST WUI: Multi Tap Network Packet Capture Developer(s) …   Wikipedia

  • Network Security & Cryptography — is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches… …   Wikipedia

  • Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) …   Wikipedia

  • Network security policy — A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document… …   Wikipedia

  • network security —    Defensive measures (hardware or software) used to impose user access restrictions on a network …   IT glossary of terms, acronyms and abbreviations


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»