Network Security /
Perez, Andre.
Network Security / André Perez. - London : Hoboken, NJ : ISTE ; Wiley, 2014. - 1 online resource
Includes bibliographical references and index.
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
9781119043942 1119043948 9781119043966 1119043964 1322166609 9781322166605 9781119043959 1119043956 9781848217584 1848217587
D8CDF404-6689-4759-9C8F-A065220E7032 OverDrive, Inc. http://www.overdrive.com
Internet--Security measures.
Computer networks--Security measures.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
Computer networks--Security measures.
Internet--Security measures.
Electronic books.
TK5105.875.I57
004.678
Network Security / André Perez. - London : Hoboken, NJ : ISTE ; Wiley, 2014. - 1 online resource
Includes bibliographical references and index.
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
9781119043942 1119043948 9781119043966 1119043964 1322166609 9781322166605 9781119043959 1119043956 9781848217584 1848217587
D8CDF404-6689-4759-9C8F-A065220E7032 OverDrive, Inc. http://www.overdrive.com
Internet--Security measures.
Computer networks--Security measures.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
Computer networks--Security measures.
Internet--Security measures.
Electronic books.
TK5105.875.I57
004.678