Introduction to computer networks and cybersecurity

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a...

Descripción completa

Detalles Bibliográficos
Otros Autores: Wu, Chwan-Hwa author (author), Irwin, J. David, 1939- author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, an imprint of Taylor and Francis 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629700306719
Tabla de Contenidos:
  • Front Cover; Contents; To the Student; To the Instructor; Highlights of the Text; Organization Supports both Hybrid and Other Well-Known Approaches; Pedagogy; Supplements; Acknowledgments; An Introduction to Information Networks; Chapter 1 - The Application Layer; Chapter 2 - DNS and Active Directory; Chapter 3 - XML-Based Web Services; Chapter 4 - Socket Programming; Chapter 5 - Peer-to-Peer (P2P) Networks and Applications; Chapter 6 - The Data Link Layer and Physical Layer; Chapter 7 - The Ethernet and Switches; Chapter 8 - Virtual LAN, Class of Service, and Multilayer Networks
  • Chapter 9 - Wireless and Mobile NetworksChapter 10 - The Network Layer; Chapter 11 - IPv6; Chapter 12 - Routing and Interior Gateways; Chapter 13 - Border Gateway Routing; Chapter 14 - The Transport Layer; Chapter 15 - Packet Loss Recovery; Chapter 16 - TCP Congestion Control; Chapter 17 - Cybersecurity Overview; Chapter 18 - Firewalls; Chapter 19 - Intrusion Detection/Prevention System; Chapter 20 - Hash and Authentication; Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security; Chapter 22 - Public Key Cryptography, Infrastructure and Certificates
  • Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer SecurityChapter 24 - Virtual Private Networks for Network Layer Security; Chapter 25 - Network Access Control and Wireless Network Security; Chapter 26 - Cyber Threats and Their Defense; Chapter 27 - Network and Information Infrastructure Virtualization; Chapter 28 - Unified Communications and Multimedia Protocols; Glossary of Acronyms; Back Cover