Record Display for the EPA National Library Catalog

RECORD NUMBER: 3 OF 4

Main Title Introduction to network security /
Author Jacobson, Douglas.
Publisher Chapman & Hall/CRC,
Year Published 2009
OCLC Number 254528888
ISBN 9781584885436; 1584885432
Subjects Computer networks--Security measures ; Computer security ; Computersicherheit ; Rechnernetz
Internet Access
Description Access URL
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015447320&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Table of contents http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3319779
Table of contents http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3319780&custom_att_2=simple_viewer
Inhaltsverzeichnis http://bvbr.bib-bvb.de:8991/F?func=service&doc%5Flibrary=BVB01&doc%5Fnumber=015447320&line%5Fnumber=0001&func%5Fcode=DB%5FRECORDS&service%5Ftype=MEDIA
Holdings
Library Call Number Additional Info Location Last
Modified
Checkout
Status
ELBM  TK5105.59.J33 2009 AWBERC Library/Cincinnati,OH 02/01/2016
Collation xxi, 478 pages : illustrations ; 25 cm.
Notes
"A Chapman & Hall book." Includes bibliographical references and index.
Contents Notes
Introduction to Network Concepts. Physical Layer. Network Layer. Transport Layer. Application Layer Security. System Wide Solutions. Introduction to network concepts and threats: Network architecture ; Network protocols ; The internet ; Taxonomy of network-based vulnerabilities -- Lower-layer security: Physical network layer overview ; Network layer protocols ; Transport layer protocols -- Application-layer security: Application layer overview ; Email Web security ; Remote access security -- Network-based mitigation: Common network security devices -- Appendix: Cryptology ; Laboratory configuration ; Homework solutions. "While most of the books available on this subject focus solely on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions. By focusing on a practical view of network security and examining actual protocols, readers can better understand the vulnerabilities and develop appropriate countermeasures."--Jacket.