Network security know it all /

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network se...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Joshi, James B. D.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Burlington, MA, USA : Morgan Kaufmann, c2008.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9780123744630
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 03136nam a2200253 a 4500
001 1/45089
008 140728s2008 us 001 0 eng
020 |a 9780123744630 
020 |a 0123744636 
035 |l 48047 
040 |a OPELS  |b eng  |c OPELS  |d OPELS  |d IDEBK  |d OCLCQ  |d OCLCF  |d GR-PeUP 
245 0 0 |a Network security  |h [electronic resource] :  |b know it all /  |c by James Joshi ... [et al.]. 
260 |a Burlington, MA, USA :  |b Morgan Kaufmann,  |c c2008. 
300 |a 1 online resource (1 v.) 
520 |a Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension. 
505 0 |a Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp. 
504 |a Includes bibliographical references and index. 
650 4 |a Computer networks  |x Security measures. 
655 4 |a Electronic books. 
700 1 |a Joshi, James B. D. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140728  |p 00b48047  |q 00b48047  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9780123744630 
856 4 |d /webopac/covers/03/48047_9780123744630.jpg 
856 4 |d /webopac/covers/03/48047_0123744636.jpg