語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network security[electronic resource] /
~
Perez, Andre.
Network security[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
004.678
書名/作者:
Network security/ Andre Perez.
作者:
Perez, Andre.
出版者:
London : : ISTE ;, 2014.
面頁冊數:
1 online resource.
標題:
Internet - Security measures.
標題:
Computer networks - Security measures.
ISBN:
9781119043942
ISBN:
1119043948
ISBN:
9781119043966
ISBN:
1119043964
ISBN:
1322166609
ISBN:
9781322166605
ISBN:
9781119043959
ISBN:
1119043956
摘要、提要註:
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
電子資源:
http://onlinelibrary.wiley.com/book/10.1002/9781119043942
Network security[electronic resource] /
Perez, Andre.
Network security
[electronic resource] /Andre Perez. - London :ISTE ;2014. - 1 online resource.
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
ISBN: 9781119043942Subjects--Topical Terms:
338953
Internet
--Security measures.
LC Class. No.: TK5105.875.I57
Dewey Class. No.: 004.678
Network security[electronic resource] /
LDR
:01949cam a2200325Ma 4500
001
437794
003
OCoLC
005
20151014014245.0
006
m o d
007
cr |||||||||||
008
160125s2014 enk o 000 0 eng d
020
$a
9781119043942
$q
electronic bk.
020
$a
1119043948
$q
electronic bk.
020
$a
9781119043966
$q
electronic bk.
020
$a
1119043964
$q
electronic bk.
020
$a
1322166609
$q
electronic bk.
020
$a
9781322166605
$q
electronic bk.
020
$a
9781119043959
$q
electronic bk.
020
$a
1119043956
$q
electronic bk.
020
$z
9781848217584
035
$a
(OCoLC)892044758
035
$a
ocn892044758
040
$a
IDEBK
$b
eng
$c
IDEBK
$d
N
$d
E7B
$d
TEFOD
$d
DG1
$d
YDXCP
$d
CDX
$d
OCLCQ
$d
VRC
$d
OCLCF
$d
TEFOD
$d
UWO
$d
TEFOD
050
4
$a
TK5105.875.I57
082
0 4
$a
004.678
$2
22
100
1
$a
Perez, Andre.
$3
624693
245
1 0
$a
Network security
$h
[electronic resource] /
$c
Andre Perez.
260
$a
London :
$b
ISTE ;
$a
Hoboken, NJ :
$b
Wiley,
$c
2014.
300
$a
1 online resource.
520
$a
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
588
0
$a
Print version record.
650
0
$a
Internet
$x
Security measures.
$3
338953
650
0
$a
Computer networks
$x
Security measures.
$3
341462
856
4 0
$u
http://onlinelibrary.wiley.com/book/10.1002/9781119043942
筆 0 讀者評論
多媒體
多媒體檔案
http://onlinelibrary.wiley.com/book/10.1002/9781119043942
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入