| 000 | 01882cam a2200289 a 4500 | ||
|---|---|---|---|
| 008 | 100227s2009 flua b 001 0 eng | ||
| 010 | _a2008040768 | ||
| 020 | _a9781584885436 (hbk. : alk. paper) | ||
| 035 | _a(Sirsi) u3966 | ||
| 040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 0 |
_a005.8 _2 22 |
| 100 | 1 |
_aJacobson, Douglas. _91246 |
|
| 245 | 1 | 0 |
_aIntroduction to network security / _c Douglas Jacobson. |
| 260 |
_aBoca Raton : _b Chapman & Hall/CRC, _c c2009. |
||
| 300 |
_axxi, 478 p. : _b ill. ; _c 25 cm. |
||
| 440 | 1 |
_aChapman & Hall/CRC computer and information science series _97832 |
|
| 500 | _a"A Chapman & Hall book." | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction to Network Concepts and Threats -- Network Architecture -- The Internet -- Taxonomy of Network-Based Vulnerabilities -- Physical Network Layer Overview -- Network Layer Protocols -- Transport Layer Protocols -- Application-Layer Security -- Application Layer Overview -- Email -- Web Security -- Remote Access Security -- Network-Based Mitigation -- Common Network Security Devices. | |
| 520 | _aUnlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack. | ||
| 650 | 0 |
_aComputer networks _x Security measures. _97833 |
|
| 650 | 0 |
_aComputer security. _97834 |
|
| 920 | _a1584885432 (hbk. : alk. paper) | ||
| 596 | _a1 | ||
| 999 |
_c2949 _d2949 |
||