Introduction to Computer Networks and Cybersecurity by J. David Irwin and Chwan-Hwa (John) Wu (2013, Hardcover)

worldofbooksinc (235286)
97,7% de votos positivos
Precio:
USD13,93
Aproximadamente12,20 EUR
+ USD37,21 de envío
Entrega prevista: jue. 14 ago. - mar. 26 ago.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Estado:
En muy buen estado
Author:Irwin, J. David. Introduction to Computer Networks and Cybersecurity. Book Binding:N/A. Book Condition:VERYGOOD. All of our paper waste is recycled within the UK and turned into corrugated cardboard.

Acerca de este artículo

Product Identifiers

PublisherTaylor & Francis Group
ISBN-101466572132
ISBN-139781466572133
eBay Product ID (ePID)117287279

Product Key Features

Number of Pages1336 Pages
LanguageEnglish
Publication NameIntroduction to Computer Networks and Cybersecurity
SubjectNetworking / General, Security / General, Security / Networking, Information Technology
Publication Year2013
TypeTextbook
Subject AreaComputers
AuthorJ. David Irwin, Chwan-Hwa (John) Wu
FormatHardcover

Dimensions

Item Height2.2 in
Item Weight111.5 Oz
Item Length11.4 in
Item Width8.7 in

Additional Product Features

Intended AudienceCollege Audience
LCCN2012-036920
Dewey Edition23
IllustratedYes
Dewey Decimal005.8
Table Of ContentAn Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. Emerging Technologies: Network and Information Infrastructure Virtualization. Unified Communications and Multimedia Protocols. Glossary of Acronyms. Index.
SynopsisIf a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint(R) animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? A guide to computer networks and cybersecurity, this book highlights the interconnections between the two to demystify the complexities of designing secure modern networks. The book walks users through the fundamentals of networks, from an overview of Internet architecture through the protocol layers. It then delves into cybersecurity, covering both attack and defense techniques, and closes with a look at the emerging technologies that will alter the current state of multimedia communication and data center/cloud computing.
LC Classification NumberTK5105.59

Todos los anuncios de este producto

¡Cómpralo ya!
Usado
Todavía no hay valoraciones ni opiniones.
Sé el primero en escribir una opinión.