Электронная книга: Andre Perez «Network Security»

Network Security

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Издательство: "John Wiley&Sons Limited"

ISBN: 9781119043966

электронная книга

Купить за 10810.32 руб и скачать на Litres

Другие книги схожей тематики:

АвторКнигаОписаниеГодЦенаТип книги
Eric ColeNetwork Security BibleThe comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest… — John Wiley&Sons Limited (USD), Подробнее...
4682.19электронная книга
Matthew StrebeNetwork Security Foundations. Technology Fundamentals for IT SuccessThe world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next… — John Wiley&Sons Limited (USD), Подробнее...
1625.34электронная книга
Nicolas LarrieuRisk Propagation Assessment for Network Security. Application to Airport Communication Network DesignThe focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool… — John Wiley&Sons Limited, Подробнее...
6100.4электронная книга
Michael GreggThe Network Security Test Lab. A Step-by-Step GuideThe ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement… — John Wiley&Sons Limited, Подробнее...
3860.83электронная книга
Jie WangIntroduction to Network Security. Theory and PracticeIntroductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash… — John Wiley&Sons Limited, Подробнее...
10038.89электронная книга
Greg HoldenGuide to Firewalls and Network Security: Intrusion Detection and VPNsThis text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an… — Course Technology, Подробнее...2003
5649.3бумажная книга
Xiaodong LinVehicular Ad Hoc Network Security and PrivacyThis book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s… — John Wiley&Sons Limited, Подробнее...
9652.07электронная книга
Matthew MonteNetwork Attacks and Exploitation. A FrameworkIncorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and… — John Wiley&Sons Limited, Подробнее...
3475.48электронная книга
Guenter SchaeferSecurity in Fixed and Wireless NetworksIntroduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the… — John Wiley&Sons Limited, Подробнее...
9265.99электронная книга
Khaldoun Agha AlNetwork CodingNetwork coding, a relatively new area of research, has evolved from the theoretical level to become a tool used to optimize the performance of communication networks– wired, cellular, ad hoc, etc… — John Wiley&Sons Limited, Подробнее...
10848.59электронная книга
Stuart JacobsSecurity Management of Next Generation Telecommunications Networks and ServicesThis book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support… — John Wiley&Sons Limited, Подробнее...
10269.66электронная книга
Ric MessierNetwork ForensicsIntensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of… — John Wiley&Sons Limited (USD), Подробнее...
3902.37электронная книга
Jessey BullockWireshark for Security Professionals. Using Wireshark and the Metasploit FrameworkMaster Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is… — John Wiley&Sons Limited (USD), Подробнее...
3577.17электронная книга
John ChirilloHack Attacks Testing. How to Conduct Your Own Security AuditLearn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the… — John Wiley&Sons Limited (USD), Подробнее...
3251.98электронная книга
Другие книги по запросу «Network Security» >>

Look at other dictionaries:

  • Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …   Wikipedia

  • network security —    Defensive measures (hardware or software) used to impose user access restrictions on a network …   IT glossary of terms, acronyms and abbreviations

  • Network Security Toolkit — NST WUI: Multi Tap Network Packet Capture Developer(s) …   Wikipedia

  • Network Security & Cryptography — is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches… …   Wikipedia

  • Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) …   Wikipedia

  • Network security policy — A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document… …   Wikipedia

  • TriGeo Network Security — Infobox Company company name = TriGeo Network Security company company type = Private company slogan = You can t protect what you can t see™ foundation = 2001 location city = Post Falls, Idaho location country = USA locations = 1 key people =… …   Wikipedia

  • EC-Council Network Security Administrator — The EC Council Network Security Administrator (ENSA) is a professional certification provided by the International Council of Electronic Commerce Consultants.The Network Security Administrator is a prerequisite for the EC Council CEH… …   Wikipedia

  • L-3 Network Security — Infobox Company type = Subsidiary of Symantec foundation = United States location = United States industry = Computers parent = SymantecL 3 Network Security is a network security company in the United States. It was acquired by Symantec on… …   Wikipedia

  • Arkoon Network Security — Création 2000 Forme juridique Société anonyme à Directoire et Conseil de surveillance Action Euronext Alternext : ALARK …   Wikipédia en Français

  • Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.