رکورد قبلیرکورد بعدی

" Business data networks and security / "


Document Type : BL
Record Number : 872909
Main Entry : Panko, Raymond R.
Title & Author : Business data networks and security /\ Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Edition Statement : Eleventh edition.
Publication Statement : NY, NY :: Pearson,, [2019]
Page. NO : xli, 469 pages ;; 24 cm
ISBN : 0134817125
: : 9780134817125
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Machine generated contents note: A State of Siege -- Anything, Anytime, Anywhere -- The Internet Reorganizes to Get Commercial -- Old Yet Always New -- Owning and Managing the Internet -- The Snake in the Garden -- Next Steps -- Outside the Internet -- Client and Server Hosts -- Networked Applications -- The Job of the Source Host -- The Job of the Destination Host -- Inside the Internet -- The Main Characters: IP Addresses, Packets, Routers, Data Links, and Routes -- IP Addresses -- IP Packets -- Routers -- Data Links and Routes -- The Transport and Internet Processes in the Network Stack -- Supervisory Standards: Beyond TCP and IP -- Single Networks, Data Links, and Physical Links -- Point-to-Point Single Networks -- Ethernet Single Networks -- Frames and Packets -- Single Network Addresses -- Internet Routers and Personal Access Routers -- Internet Core Routers -- Residential Access Router -- Corporate Access Point -- Where to Next? -- End-of-Chapter Questions.
: Note continued: Adding Connectors -- Cutting the Cord -- Stripping the Cord -- Working with the Exposed Pairs -- Pair Colors -- Untwisting the Pairs -- Ordering the Pairs -- Cutting the Wires -- Adding the Connector -- Holding the Connector -- Sliding in the Wires -- Some Jacket Inside the Connector -- Crimping -- Pressing Down -- Making Electrical Contact -- Strain Relief -- Testing -- Testing with Continuity Testers -- Testing for Signal Quality -- Introduction -- OSI Standards -- 802.11 = Wi-Fi -- Basic Access Point Operation -- Radio Signal Propagation -- Perfidious Radio -- Frequencies -- Antennas -- Wireless Propagation Problems -- Service Bands and Bandwidth -- Service Bands -- Signal and Channel Bandwidth -- Licensed and Unlicensed Service Bands -- Channel Use and Co-Channel Interference -- The 2.4 GHz and 5 GHz Unlicensed Service Bands -- Spread Spectrum Transmission -- Normal versus Spread Spectrum Transmission.
: Note continued: Basic Physical Layer Terminology -- Ethernet Physical Layer Standards -- Signaling -- 4-Pair Unshielded Twisted Pair (UTP) Physical Links -- Optical Fiber (Fiber) -- Link Aggregation (Bonding) -- Perspective on Purchasing Physical Links in Ethernet -- In More Depth: Fiber Modes and Light Wavelength -- The Ethernet Data Link Layer Switching and Frame Syntax Standard -- Physical Link and Data Link Length Restrictions -- Ethernet Data Link Layer Switch Operation -- Core Fields in the Ethernet Frame -- In More Depth: Secondary Fields in The Ethernet Frame -- Management -- SNMP -- Reliability -- Ethernet Security -- Ethernet Security in Perspective -- Virtual LANs (VLANs) for Network Segregation -- Initial User Authentication Through 802.1X -- 802.1AE Switch-to-Switch Protection -- ARP Cache Poisoning -- End-of-Chapter Questions -- Introduction -- Solid and Stranded Wiring -- Solid-Wire UTP versus Stranded-Wire UTP -- Relative Advantages.
: Note continued: Beyond 802.11i Security -- Rogue Access Points -- Evil Twin Access Points and Virtual Private Networks (VPNs) -- 802.11 Wi-Fi Wireless LAN Management -- Access Point Placement -- Centralized Management -- In More Depth: Expressing Power Ratios in Decibels -- Peer-to-Peer Protocols for the Internet of Things (IoT) -- Bluetooth -- Classic Bluetooth and Bluetooth Low Energy (LE) -- One-to-One, Master-Slave Operation -- Bluetooth Profiles -- Bluetooth Low Energy -- Other Promising loT Transmission Standards -- Near Field Communication (NFC) -- Wi-Fi Direct -- Zigbee and Z-Wave -- Security in the Internet of Things -- End of Chapter Questions -- Introduction -- IP Routing -- Hierarchical IPv4 Addressing -- Routers, Networks, and Subnets -- Network and Subnet Masks -- How Routers Process Packets -- Switching versus Routing -- Routing Table -- Rows Are Routes for All IPv4 Addresses in a Range -- Step 1: Finding All Row Matches.
: Note continued: Cellular Generations: 3G, 4G, and 5G -- Wired Business WANs -- Leased Lines -- Reaching the ISP via a Leased Line -- Leased Line Private Corporate WANs -- Carrier WAN Services -- Carrier Ethernet -- Multiprotocol Label Switching (MPLS) -- WAN Optimization -- End-of-Chapter Questions -- Introduction -- Networked Applications and Application Architectures -- Application Security -- Netflix Dives into the Amazon -- Netflix -- Virtualization and Agility -- Infrastructure as a Service (IaaS) and Software as a Service (SaaS) -- Clients Move into the Cloud -- Rain Clouds: Security -- Networks and The Cloud -- The World Wide Web -- HTTP and HTML Standards -- Complex Webpages -- The Hypertext Transfer Protocol (HTTP) -- Electronic Mail (E-Mail) -- Delivery Standards -- Receiving Standards -- E-Mail File Format Standards -- Cryptographic E-Mail Protections -- Voice Over IP (VoIP) -- CODEC -- External Components -- VoIP Signaling -- The VoIP Transport Packet.
: Note continued: Converting Integers into Binary Numbers (1s and Os) -- Encoding Alternatives -- Protocols in this Chapter -- End-of-Chapter Questions -- Introduction -- Network Quality of Service (QoS) -- Transmission Speed -- Other Quality-of-Service Metrics -- Service Level Agreements (SLAs) -- Network Design -- Traffic Analysis -- Reliability Through Redundancy -- Traffic Requirements versus Leased Lines -- Momentary Traffic Peaks -- Centralized Network Management -- Ping -- Traceroute -- The Simple Network Management Protocol (SNMP) -- Automation -- Software-Defined Networking (SDN) -- Traditional Configuration and Its Discontents -- Software-Defined Networking Operation -- End-of-Chapter Questions -- What is Visio? -- Using Visio -- The Target Breach -- The POS Attack -- Damages -- Perspective -- Introduction -- Types of Attacks -- Malware Attacks -- Vulnerabilities and Patches -- Social Engineering: No Vulnerability Necessary -- Types of Malware -- Payloads.
: Note continued: How Internet Standards Come to Be -- In More Depth: April 1 and RFCs -- Introduction -- Standard = Protocol -- What Are Network Standards? -- The Importance of Standards -- Creating Standards -- Standards Agencies -- Standards Architectures -- The O51 Standards Architecture -- The TCP/IP Standards Architecture -- When Do We Capitalize "Internet?" -- The Hybrid TCP/IP-OSI Standards Architecture -- Message Ordering (Plus Reliability and Connection Orientation) in Standards -- Simple Message Ordering in HTTP -- Message Ordering and Reliability in TCP at the Transport Layer -- Message Syntax in Standards -- Syntax: General Message Organization -- The Syntax of the Internet Protocol (IP) Packet -- Transmission Control Protocol (TCP) Segment Syntax -- User Datagram Protocol (UDP) Datagram Syntax -- Port Numbers -- Frame Syntax -- Encoding Application Messages into Binary -- Encoding -- Encoding Text as ASCII.
: Note continued: Human Break-Ins (Hacking) -- Denial-of-Service (DoS) Attacks -- Advanced Persistent Threats (APTs) -- Types of Attackers -- Cybercriminals -- Employees, Ex-Employees, and Other Insiders -- Business Competitors -- Cyberterrorists and National Governments -- Protecting Dialogues Cryptographically -- Encryption for Confidentiality -- Electronic Signatures: Message Authentication and Integrity -- Host-to-Host Virtual Private Networks (VPNs) -- Authentication -- Authentication Terminology and Concepts -- Reusable Passwords -- Other Forms of Authentication -- Firewalls and Intrusion Detection Systems -- Dropping and Logging Provable Attack Packets -- Stateful Packet Inspection (SPI) Firewalls -- Next-Generation (Application Aware) Firewalls (NGFWs) -- Intrusion Detection System (IDSs) -- In More Depth: Antivirus Protection -- End-of-Chapter Questions -- Ethernet Begins -- Introduction -- Local Area Networks -- Perspective: Layer 1 and Layer 2 Standards.
: Note continued: Orthogonal Frequency Division Multiplexing (OFDM) Spread Spectrum Transmission -- 802.11 WLAN Operation -- From 802.11 to 802.3 -- Wireless Networks with Multiple Access Points -- Media Access Control -- In More Depth: Media Access Control (Mac) -- 802.11 Transmission Standards -- Channel Bandwidth and Service Band Bandwidth -- Speed and Market Status -- Your Service Speed Will Vary. A Lot. -- Multiple Input/Multiple Output (MIMO) -- Beamforming and Multiuser MIMO -- In More Depth: 802.11/WI-Fl Notes -- End-of-Chapter Questions -- Introduction -- The Four Windows -- The Radar Window (Read the Fine Print) -- Connection Window -- The Networks Window -- Signal History -- Other Groups on the Ribbon -- Tests -- Connection Test -- Speed Test -- Quality Test -- Child's Play -- 802.11i WLAN Security -- 802.11i -- 802.11i Stages -- Pre-Shared Key (PSK) Initial Authentication Mode in 802.11i -- 802.1X Initial Authentication Mode Operation.
: Note continued: Other TCP/IP Standards -- Network Address Translation (NAT) -- The Domain Name System (DNS) -- DHCP Servers -- Simple Network Management Protocol (SNMP) -- Dynamic Routing Protocols -- Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer -- IPsec -- Core IPsec Principles -- VPNs -- Applying ESP Protections -- Security Associations (SAs) -- Creating Security Associations -- SSL/TLS VPNs -- End-of-Chapter Questions -- Command Line Interfaces (CLIs) -- CLI Essentials -- A More Complex Cisco IOS Interaction -- LANs and WANs (and MANs) -- LANs versus MANs and WANs -- Other Aspects of WANs -- Carrier WAN Components and Business Uses -- The Telephone System -- Residential Wired Internet Access -- Residential Asymmetric Digital Subscriber Line (ADSL) Service -- Cable Modem Service -- ADSL versus Cable Modem Service -- Cellular Data Service -- Cellular Service -- Why Cells? -- Cellular Data Speeds.
: Note continued: Peer-to-Peer (P2P) Applications -- Skype -- Tor -- End-of-Chapter Questions -- Failures in the Target Breach -- The Plan-Protect-Respond Cycle -- Security Planning Principles -- Risk Analysis -- Comprehensive Security -- Defense in Depth and Weakest Links -- Identify and Manage Single Points of Takeover -- Least Permissions -- Identity Management -- Segment the Network -- Organizational System Security -- Policy-Based Security Management -- Policies versus Implementation -- Oversight -- Implementation Guidance -- Policy-Based Centralized Management -- Response -- Normal Incidents -- Major Incidents -- Rehearsing for Major Incidents -- Real-Time Fail-Over -- Intrusion Detection Systems (IDSs) -- End-of-Chapter Questions.
: Note continued: Step 2: Selecting the Best-Match Row -- Step 3: Sending the Packet Back Out -- Cheating (Decision Caching) -- Routing Tables for IPv6 Addresses -- In More Depth: Masking When Masks Do Not Break at 8-Bit Boundaries -- The Internet Protocol Version 4 (IPv4) Fields -- The First Row -- The Second Row -- The Third Row -- IP Options -- IP Version 6 (IPv6) -- Outgrowing IPv4 -- IPv6 -- Writing IPv6 Addresses in Canonical Text Notation (RFC 5952) -- The IPv6 Main Header -- Extension Headers -- The Transmission Control Protocol (TCP) -- Fields in TCP/IP Segments -- Openings and Abrupt TCP Closes -- The Limited Maximum Length of User Datagram Protocol (UDP) Datagrams -- End-of-Chapter Questions -- Introduction -- Getting Wireshark -- Using Wireshark -- Getting Started -- Starting a Packet Capture -- Getting Data -- Stopping Data Collection -- Looking at Individual Packets -- Options -- Introduction -- IP Subnetting -- IPv4 Subnet Planning -- IPv6 Subnetting.
Subject : Business enterprises-- Computer networks-- Security measures.
Subject : Computer networks-- Management.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Business enterprises-- Computer networks-- Security measures.
Subject : Computer networks-- Management.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Computersicherheit
Subject : Datensicherung
Subject : Rechnernetz
Dewey Classification : ‭658.4/78‬
LC Classification : ‭HD30.37‬‭.P36 2019‬
Added Entry : Panko, Julia L.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟