000 | 03200cam a2200649Ma 4500 | ||
---|---|---|---|
001 | ocn892044758 | ||
003 | OCoLC | ||
005 | 20220701010954.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 141003s2014 enk ob 001 0 eng d | ||
040 |
_aIDEBK _beng _epn _cIDEBK _dN$T _dE7B _dTEFOD _dDG1 _dYDXCP _dCDX _dOCLCQ _dVRC _dOCLCF _dTEFOD _dUWO _dTEFOD _dCOO _dOCLCO _dEBLCP _dOCLCQ _dDEBBG _dDEBSZ _dOCLCQ _dOCLCO _dDG1 |
||
019 | _a961308287 | ||
020 |
_a9781119043942 _q(electronic bk.) |
||
020 |
_a1119043948 _q(electronic bk.) |
||
020 |
_a9781119043966 _q(electronic bk.) |
||
020 |
_a1119043964 _q(electronic bk.) |
||
020 |
_a1322166609 _q(electronic bk.) |
||
020 |
_a9781322166605 _q(electronic bk.) |
||
020 |
_a9781119043959 _q(electronic bk.) |
||
020 |
_a1119043956 _q(electronic bk.) |
||
020 | _a9781848217584 | ||
020 | _a1848217587 | ||
029 | 1 |
_aAU@ _b000053982547 |
|
029 | 1 |
_aAU@ _b000058372892 |
|
029 | 1 |
_aCHBIS _b010441694 |
|
029 | 1 |
_aCHVBK _b33408413X |
|
029 | 1 |
_aDEBBG _bBV042987731 |
|
029 | 1 |
_aDEBSZ _b475029496 |
|
035 |
_a(OCoLC)892044758 _z(OCoLC)961308287 |
||
037 |
_aD8CDF404-6689-4759-9C8F-A065220E7032 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
050 | 4 | _aTK5105.875.I57 | |
072 | 7 |
_aCOM _x06040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
082 | 0 | 4 |
_a004.678 _222 |
049 | _aMAIN | ||
100 | 1 | _aPerez, Andre. | |
245 | 1 | 0 |
_aNetwork Security / _cAndré Perez. |
260 |
_aLondon : _bISTE ; _aHoboken, NJ : _bWiley, _c2014. |
||
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aPrint version record. | |
520 | _aThis book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection. | ||
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aInternet _xSecurity measures. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aInternet _xSecurity measures. _2fast _0(OCoLC)fst01751426 |
|
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _z9781848217584 |
856 | 4 | 0 |
_uhttp://dx.doi.org/10.1002/9781119043942 _zWiley Online Library |
994 |
_a92 _bDG1 |
||
999 |
_c21726 _d21685 |