Document Type
|
:
|
BL
|
Record Number
|
:
|
794613
|
Doc. No
|
:
|
b614652
|
Main Entry
|
:
|
Neal Krawetz.
|
Title & Author
|
:
|
Introduction to network security\ Neal Krawetz.
|
Edition Statement
|
:
|
1st ed
|
Publication Statement
|
:
|
Boston, Mass.: Charles River Media, [2007] ©2007
|
Series Statement
|
:
|
Networking series (Charles River Media)
|
Page. NO
|
:
|
(xxiv, 583 pages) : illustrations
|
ISBN
|
:
|
1584506431
|
|
:
|
: 9781584506430
|
Notes
|
:
|
Title from title screen.; Includes link to CD content.
|
Contents
|
:
|
Contents"; "Acknowledgments"; "Part I: Overview"; "1 Security"; "1.1 Importance"; "1.2 Threat Models"; "1.3 Concepts"; "1.4 Common Mitigation Methods"; "1.5 People and Staff"; "1.6 Certifications"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "2 Ethics"; "2.1 Ethical Training"; "2.2 Ethical, Social, and Legal Considerations"; "2.3 Intellectual Property"; "2.4 Computer Crimes"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "3 Network Theory"; "3.1 Standards Bodies" "3.2 Network Stacks""3.3 Multiple Stacks"; "3.4 Layers and Protocols"; "3.5 Common Tools"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "4 Basic Cryptography"; "4.1 Securing Information"; "4.2 Necessary Elements"; "4.3 Authentication and Keys"; "4.4 Cryptography and Randomness"; "4.5 Hashes"; "4.6 Ciphers"; "4.7 Encryption"; "4.8 Steganography"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "Part II: OSI Layer I"; "5 Physical Layer"; "5.1 Types of Physical Mediums" "5.2 Physical Network Components""5.3 Physical Network Risks"; "5.4 Topologies"; "5.5 Physical Layer Security"; "5.6 Tracking Attacks"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "6 Physical LAN"; "6.1 Physical LAN Regions"; "6.2 Types of Attacks"; "6.3 Firewalls"; "6.4 Privileged Zones"; "6.5 LAN Connections"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "7 Wireless Networking"; "7.1 Wireless Spectrum"; "7.2 Wireless Protocols"; "7.3 Wireless Risks"; "7.4 Risk Mitigation Options" "Summary""Review Questions"; "Discussion Topics"; "Additional Resources"; "Part III: OSI Layer 2"; "8 Data Link Layer"; "8.1 Data Flow"; "8.2 Common Uses"; "8.3 Layered Data Link Protocols"; "8.4 Uncommon Uses"; "8.5 Common Mitigation Options"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "9 SLIP and PPP"; "9.1 Simplified Data Link Services"; "9.2 Point-to-Point Protocols"; "9.3 Common Risks"; "9.4 Similar Threats"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "10 MAC and ARP" "10.1 Data Link Sublayers""10.2 ARP and RARP"; "10.3 Network Routing"; "10.4 Physical Layer Risks"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "Part IV: OSI Layer 3"; "11 Network Layer"; "11.1 Routing"; "11.2 Routing Risks"; "11.3 Addressing"; "11.4 Risks to Address Schemes"; "11.5 Fragmentation"; "11.6 Fragmentation Risks"; "11.7 Quality of Service"; "11.8 Quality-of-Service Attacks"; "11.9 Security"; "Summary"; "Review Questions"; "Discussion Topics"; "Additional Resources"; "12 Internet Protocol (IP)"
|
Abstract
|
:
|
This book will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. It will teach you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols.--[book cover].
|
Subject
|
:
|
Computer network protocols -- Textbooks.
|
Subject
|
:
|
Computer networks -- Security measures -- Textbooks.
|
Subject
|
:
|
COMPUTERS -- Internet -- Security.
|
LC Classification
|
:
|
TK5105.59N435 9999
|
Added Entry
|
:
|
Neal Krawetz
|