Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT professionals.Dr. Wang has been Professor of Computer Science at the University of Massachusetts Lowell since 2001, Director of its Center for Network and Information Security since 2004,and Chairman of its Department of Computer Science since 2007.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
From the reviews: "This book aims to provide a complete overview of network security and highlight recent advances and practical solutions to security threats. It is ... used as a textbook for a course on network security for senior undergraduate and graduate students. ... serve as a reference for information technology (IT) professionals. ... The book provides a beneficial introduction to network security. ... There are numerous tables and diagrams. ... I recommend the book as a useful textbook for network security." (S. V. Nagaraj, ACM Computing Reviews, August, 2009) "The book under review provides the reader with an interesting and well-written overview of a variety of aspects of network security. ... the book is very interesting and covers current security issues not only from the theoretical but ... also from the practical point of view. The book is recommended to all theoreticians and practitioners that would like to have available a comprehensive compendium treating modern network security." (Jozef Wozniak, Zentralblatt MATH, Vol. 1167, 2009)
Network Security Overview.- Data Encryption Algorithms.- Public-Key Cryptography and Key Management.- Data Authentications.- Practical Network Security Protocols.- Wireless Network Security Protocols.- Firewalls.- Defending against Malicious Software.- Intrusion Detections.-References.- Index.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
(nessuna copia disponibile)
Cerca: Inserisci un desiderataNon riesci a trovare il libro che stai cercando? Continueremo a cercarlo per te. Se uno dei nostri librai lo aggiunge ad AbeBooks, ti invieremo una notifica!
Inserisci un desiderata