Network Security

Nonfiction, Science & Nature, Technology, Telecommunications
Cover of the book Network Security by André Pérez, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: André Pérez ISBN: 9781119043959
Publisher: Wiley Publication: September 25, 2014
Imprint: Wiley-ISTE Language: English
Author: André Pérez
ISBN: 9781119043959
Publisher: Wiley
Publication: September 25, 2014
Imprint: Wiley-ISTE
Language: English

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.

Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.

The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.

Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.

The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

More books from Wiley

Cover of the book Counter Electrodes for Dye-Sensitized and Perovskite Solar Cells (2 Vols.) by André Pérez
Cover of the book Electronic Literature by André Pérez
Cover of the book Managing the Global Workforce by André Pérez
Cover of the book iPad for the Older and Wiser by André Pérez
Cover of the book Canon EOS 70D For Dummies by André Pérez
Cover of the book How to Invest in Structured Products by André Pérez
Cover of the book Business NLP For Dummies by André Pérez
Cover of the book A Non-Freaked Out Guide to Teaching the Common Core by André Pérez
Cover of the book Epigenetics in Cancer by André Pérez
Cover of the book Evaluation and Facilitation by André Pérez
Cover of the book Islam by André Pérez
Cover of the book Positive Psychology and Change by André Pérez
Cover of the book Selected Papers From Volumes 33 and 34 of Vychislitel'naya Seysmologiya by André Pérez
Cover of the book Reaching Boys, Teaching Boys by André Pérez
Cover of the book Micro- and Nanosystems for Biotechnology by André Pérez
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy