Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.
The book begins with a brief discussion of network architectures and the functions of layers in a typical network. It then examines vulnerabilities and attacks divided into four categories: header-, protocol-, authentication-, and traffic-based. The author next explores the physical, network, and transport layers of each network as well as the security of several common network applications. The last section recommends several network-based security solutions that can be successfully deployed.
This book uses a define-attack-defend methodology for network security. The author briefly introduces the relevant protocols and follows up with detailed descriptions of known vulnerabilities and possible attack methods. He delineates the threats against the protocol and presents possible solutions. Sample problems and lab experiments based on the concepts allow readers to experiment with attacks and assess the effectiveness of solutions. Two appendices provide further clarification and a companion website is offered which supplements the material.
While most of the books available on this subject focus solely on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions. By focusing on a practical view of network security and examining actual protocols, readers can better understand the vulnerabilities and develop appropriate countermeasures.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Douglas Jacobson
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Hardback. Condizione: Fine. Codice articolo GOR011153912
Quantità: 1 disponibili
Da: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-F-049-01455
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
Hardcover. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_421482704
Quantità: 1 disponibili
Da: BennettBooksLtd, Los Angeles, CA, U.S.A.
hardcover. Condizione: New. In shrink wrap. Looks like an interesting title! Codice articolo Q-1584885432
Quantità: 1 disponibili
Da: Chiron Media, Wallingford, Regno Unito
Hardcover. Condizione: New. Codice articolo 6666-TNFPD-9781584885436
Quantità: 5 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 5040817-n
Quantità: 10 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 5040817-n
Quantità: Più di 20 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. 502 Illus. This item is printed on demand. Codice articolo 8272282
Quantità: 3 disponibili
Da: Buchpark, Trebbin, Germania
Condizione: Sehr gut. Zustand: Sehr gut | Seiten: 500 | Sprache: Englisch | Produktart: Bücher | Introduction to Network Security focuses on the network and its vulnerabilities, protocols, and security solutions. The book discusses network architecture, the functions of layers in a typical network, and network-based attacks, including header, protocol, and authentication attacks. Using a bottom-up approach, it provides understanding of the vulnerabilities and mechanisms of each layer of network security. A define-attack-defend methodology is used throughout the text to introduce relevant protocols. The author also presents homework problems, laboratory experiments, and appendices that offer an overview of cryptology and demonstrate how to develop a low-cost lab. Codice articolo 5022666/202
Quantità: 2 disponibili
Da: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9781584885436
Quantità: Più di 20 disponibili