Bagikan Barang Ini

Komentar Publik

Introduction to Computer Networks and Cybersecurity eBook

icon

6 months ago oleh ebookita

icon

Rp 10,000

icon

0 Suka

icon

Baru

icon

Di Buku

icon

EBOOK FORMAT PDF Untuk pemesanan langsung Klik MAKE OFFER sesuai harga eBook Ebook di kirim via Email ---------------------------------------------- Title: Introduction to Computer Networks and Cybersecurity Author: Chwan-Hwa (John) Wu, J. David Irwin Length: 1336 pages Edition: 1 Language: English Publisher: CRC Press Publication Date: 2013-02-04 If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks—through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks—and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book’s modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption. Table of Contents Chapter 1 - The Application Layer Chapter 2 - DNS and Active Directory Chapter 3 - XML-Based Web Services Chapter 4 - Socket Programming Chapter 5 - Peer-to-Peer (P2P) Networks and Applications Chapter 6 - The Data Link Layer and Physical Layer Chapter 7 - The Ethernet and Switches Chapter 8 - Virtual LAN, Class of Service, and Multilayer Networks Chapter 9 - Wireless and Mobile Networks Chapter 10 - The Network Layer Chapter 11 - IPv6 Chapter 12 - Routing and Interior Gateways Chapter 13 - Border Gateway Routing Chapter 14 - The Transport Layer Chapter 15 - Packet Loss Recovery Chapter 16 - TCP Congestion Control Chapter 17 - Cybersecurity Overview Chapter 18 - Firewalls Chapter 19 - Intrusion Detection/Prevention System Chapter 20 - Hash and Authentication Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security Chapter 22 - Public Key Cryptography, Infrastructure and Certificates Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security Chapter 24 - Virtual Private Networks for Network Layer Security Chapter 25 - Network Access Control and Wireless Network Security Chapter 26 - Cyber Threats and Their Defense Chapter 27 - Network and Information Infrastructure Virtualization Chapter 28 - Unified Communications and Multimedia Protocols

Dapatkan Ini

icon

Opsi pengiriman

Bertemu Penjual

ebookita
ebookita
isEmailVerified
Ulasan
  • 53
  • 0
  • 0

KAMU MUNGKIN SUKA