Description |
1 online resource (1 volume) |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Summary |
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension. |
Contents |
Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp. |
Bibliography |
Includes bibliographical references and index. |
Note |
Print version record. |
Subject |
Computer networks -- Security measures.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures.
|
|
Computer networks -- Security measures.
|
|
Computer networks -- Security measures
|
Added Author |
Joshi, James B. D.
|
Other Form: |
Print version: Network security. Burlington, MA, USA : Morgan Kaufmann, ©2008 9780123744630 0123744636 (DLC) 2008012262 (OCoLC)213480177 |
ISBN |
9780123744630 |
|
0123744636 |
Standard No. |
AU@ 000043178442 |
|
CHBIS 006151787 |
|
CHNEW 001007623 |
|
CHVBK 171222520 |
|
DEBBG BV042305725 |
|
DEBSZ 35539538X |
|
DEBSZ 405318987 |
|
HEBIS 291468608 |
|
NZ1 12541561 |
|
NZ1 15189667 |
|