Network Security Technologies
* Provides a comprehensive discussion of all major network security-related technologies from diverse fields * Includes references at the end of each chapter for those seeking understanding of in-depth theory and technical details * Explores the interworking of confidentiality, authenticat...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1360 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1360 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-13602009-11-27T09:35:01Z Network Security Technologies T Fung, Kwok * Provides a comprehensive discussion of all major network security-related technologies from diverse fields * Includes references at the end of each chapter for those seeking understanding of in-depth theory and technical details * Explores the interworking of confidentiality, authentication, authorization, integrity, and non-repudiation technologies * Details remote access and WLAN and other key security architectures Network security development and implementation efforts involve the integration of technologies from seemingly unrelated fields that did not previously have to cross paths or internetwork. Areas such as cryptography, network protocols, and switch and router technology each have established theories and practices; developing expertise in all of these fields is a challenging task. Security professionals need a resource that can help them bring all of these security components together for the benefit of their organizations. Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. INTRODUCTION BASIC CONFIDENTIALITY TECHNOLOGIES BASIC AUTHENTICATION TECHNOLOGIES BASIC AUTHORIZATION TECHNOLOGIES BASIC MESSAGE INTEGRITY TECHNOLOGIES BASIC NON-REPUDIATION TECHNOLOGIES ENHANCED TECHNOLOGIES INTEGRATED TECHNOLOGIES NETWORK SECURITY ARCHITECTURES WLAN SECURITY ARCHITECTURE NETWORK SECURITY IMPLEMENTATION TOPICS APPENDIX A: SECURITY TECHNOLOGIES: A HIERARCHICAL GUIDE APPENDIX B: NSA AND SNAC ROUTER SECURITY CONFIGURATION GUIDE SUMMARY APPENDIX C: KEY NETWORK SECURITY TERMS AND DEFINITIONS APPENDIX D: LIST OF COMMON TCP AND UDP WELL-KNOWN PORTS APPENDIX E: RSA PUBLIC-KEY CRYPTOGRAPHY EXAMPLE APPENDIX F: ACRONYMS 2009-11-27T09:35:01Z 2009-11-27T09:35:01Z 2004 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1360 en application/octet-stream CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
* Provides a comprehensive discussion of all major network security-related technologies from diverse fields
* Includes references at the end of each chapter for those seeking understanding of in-depth theory and technical details
* Explores the interworking of confidentiality, authentication, authorization, integrity, and non-repudiation technologies
* Details remote access and WLAN and other key security architectures
Network security development and implementation efforts involve the integration of technologies from seemingly unrelated fields that did not previously have to cross paths or internetwork. Areas such as cryptography, network protocols, and switch and router technology each have established theories and practices; developing expertise in all of these fields is a challenging task. Security professionals need a resource that can help them bring all of these security components together for the benefit of their organizations.
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. |
format |
Book |
author |
T Fung, Kwok |
spellingShingle |
T Fung, Kwok Network Security Technologies |
author_facet |
T Fung, Kwok |
author_sort |
T Fung, Kwok |
title |
Network Security Technologies |
title_short |
Network Security Technologies |
title_full |
Network Security Technologies |
title_fullStr |
Network Security Technologies |
title_full_unstemmed |
Network Security Technologies |
title_sort |
network security technologies |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1360 |
_version_ |
1757672483594436608 |