• الرئیسیة
  • البحث المتقدم
  • قائمة المکتبات
  • حول الموقع
  • اتصل بنا
  • نشأة

عنوان
Introduction to network security

پدید آورنده
Neal Krawetz.

موضوع
Computer network protocols -- Textbooks.,Computer networks -- Security measures -- Textbooks.,COMPUTERS -- Internet -- Security.

رده
TK5105
.
59
N435
9999

کتابخانه
کتابخانه مطالعات اسلامی به زبان های اروپایی

محل استقرار
استان: قم ـ شهر: قم

کتابخانه مطالعات اسلامی به زبان های اروپایی

تماس با کتابخانه : 32910706-025

1584506431
9781584506430

b614652

Introduction to network security
[Book]
Neal Krawetz.

1st ed

Boston, Mass.
Charles River Media
[2007] ©2007

(xxiv, 583 pages) : illustrations

Networking series (Charles River Media)

Title from title screen.; Includes link to CD content.

Contents"; "Acknowledgments"; "Part I: Overview"; "1 Security"; "1.1 Importance"; "1.2 Threat Models"; "1.3 Concepts"; "1.4 Common Mitigation Methods"; "1.5 People and Staff"; "1.6 Certifications"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "2 Ethics"; "2.1 Ethical Training"; "2.2 Ethical, Social, and Legal Considerations"; "2.3 Intellectual Property"; "2.4 Computer Crimes"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "3 Network Theory"; "3.1 Standards Bodies" "3.2 Network Stacks""3.3 Multiple Stacks"; "3.4 Layers and Protocols"; "3.5 Common Tools"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "4 Basic Cryptography"; "4.1 Securing Information"; "4.2 Necessary Elements"; "4.3 Authentication and Keys"; "4.4 Cryptography and Randomness"; "4.5 Hashes"; "4.6 Ciphers"; "4.7 Encryption"; "4.8 Steganography"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "Part II: OSI Layer I"; "5 Physical Layer"; "5.1 Types of Physical Mediums" "5.2 Physical Network Components""5.3 Physical Network Risks"; "5.4 Topologies"; "5.5 Physical Layer Security"; "5.6 Tracking Attacks"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "6 Physical LAN"; "6.1 Physical LAN Regions"; "6.2 Types of Attacks"; "6.3 Firewalls"; "6.4 Privileged Zones"; "6.5 LAN Connections"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "7 Wireless Networking"; "7.1 Wireless Spectrum"; "7.2 Wireless Protocols"; "7.3 Wireless Risks"; "7.4 Risk Mitigation Options" "Summary""Review Questions"; "Discussion Topics"; "Additional Resources"; "Part III: OSI Layer 2"; "8 Data Link Layer"; "8.1 Data Flow"; "8.2 Common Uses"; "8.3 Layered Data Link Protocols"; "8.4 Uncommon Uses"; "8.5 Common Mitigation Options"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "9 SLIP and PPP"; "9.1 Simplified Data Link Services"; "9.2 Point-to-Point Protocols"; "9.3 Common Risks"; "9.4 Similar Threats"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "10 MAC and ARP" "10.1 Data Link Sublayers""10.2 ARP and RARP"; "10.3 Network Routing"; "10.4 Physical Layer Risks"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "Part IV: OSI Layer 3"; "11 Network Layer"; "11.1 Routing"; "11.2 Routing Risks"; "11.3 Addressing"; "11.4 Risks to Address Schemes"; "11.5 Fragmentation"; "11.6 Fragmentation Risks"; "11.7 Quality of Service"; "11.8 Quality-of-Service Attacks"; "11.9 Security"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "12 Internet Protocol (IP)"

This book will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. It will teach you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols.--[book cover].

Computer network protocols -- Textbooks.
Computer networks -- Security measures -- Textbooks.
COMPUTERS -- Internet -- Security.

TK5105
.
59
N435
9999

Neal Krawetz.

Neal Krawetz

 مطالعه متن کتاب 

[Book]

Y

الاقتراح / اعلان الخلل

تحذیر! دقق في تسجیل المعلومات
ارسال عودة
تتم إدارة هذا الموقع عبر مؤسسة دار الحديث العلمية - الثقافية ومركز البحوث الكمبيوترية للعلوم الإسلامية (نور)
المكتبات هي المسؤولة عن صحة المعلومات كما أن الحقوق المعنوية للمعلومات متعلقة بها
برترین جستجوگر - پنجمین جشنواره رسانه های دیجیتال