Network Security Technologies

* Provides a comprehensive discussion of all major network security-related technologies from diverse fields * Includes references at the end of each chapter for those seeking understanding of in-depth theory and technical details * Explores the interworking of confidentiality, authenticat...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: T Fung, Kwok
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1360
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1360
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-13602009-11-27T09:35:01Z Network Security Technologies T Fung, Kwok * Provides a comprehensive discussion of all major network security-related technologies from diverse fields * Includes references at the end of each chapter for those seeking understanding of in-depth theory and technical details * Explores the interworking of confidentiality, authentication, authorization, integrity, and non-repudiation technologies * Details remote access and WLAN and other key security architectures Network security development and implementation efforts involve the integration of technologies from seemingly unrelated fields that did not previously have to cross paths or internetwork. Areas such as cryptography, network protocols, and switch and router technology each have established theories and practices; developing expertise in all of these fields is a challenging task. Security professionals need a resource that can help them bring all of these security components together for the benefit of their organizations. Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. INTRODUCTION BASIC CONFIDENTIALITY TECHNOLOGIES BASIC AUTHENTICATION TECHNOLOGIES BASIC AUTHORIZATION TECHNOLOGIES BASIC MESSAGE INTEGRITY TECHNOLOGIES BASIC NON-REPUDIATION TECHNOLOGIES ENHANCED TECHNOLOGIES INTEGRATED TECHNOLOGIES NETWORK SECURITY ARCHITECTURES WLAN SECURITY ARCHITECTURE NETWORK SECURITY IMPLEMENTATION TOPICS APPENDIX A: SECURITY TECHNOLOGIES: A HIERARCHICAL GUIDE APPENDIX B: NSA AND SNAC ROUTER SECURITY CONFIGURATION GUIDE SUMMARY APPENDIX C: KEY NETWORK SECURITY TERMS AND DEFINITIONS APPENDIX D: LIST OF COMMON TCP AND UDP WELL-KNOWN PORTS APPENDIX E: RSA PUBLIC-KEY CRYPTOGRAPHY EXAMPLE APPENDIX F: ACRONYMS 2009-11-27T09:35:01Z 2009-11-27T09:35:01Z 2004 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1360 en application/octet-stream CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description * Provides a comprehensive discussion of all major network security-related technologies from diverse fields * Includes references at the end of each chapter for those seeking understanding of in-depth theory and technical details * Explores the interworking of confidentiality, authentication, authorization, integrity, and non-repudiation technologies * Details remote access and WLAN and other key security architectures Network security development and implementation efforts involve the integration of technologies from seemingly unrelated fields that did not previously have to cross paths or internetwork. Areas such as cryptography, network protocols, and switch and router technology each have established theories and practices; developing expertise in all of these fields is a challenging task. Security professionals need a resource that can help them bring all of these security components together for the benefit of their organizations. Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide.
format Book
author T Fung, Kwok
spellingShingle T Fung, Kwok
Network Security Technologies
author_facet T Fung, Kwok
author_sort T Fung, Kwok
title Network Security Technologies
title_short Network Security Technologies
title_full Network Security Technologies
title_fullStr Network Security Technologies
title_full_unstemmed Network Security Technologies
title_sort network security technologies
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1360
_version_ 1757672483594436608