000 03200cam a2200649Ma 4500
001 ocn892044758
003 OCoLC
005 20220701010954.0
006 m o d
007 cr cnu---unuuu
008 141003s2014 enk ob 001 0 eng d
040 _aIDEBK
_beng
_epn
_cIDEBK
_dN$T
_dE7B
_dTEFOD
_dDG1
_dYDXCP
_dCDX
_dOCLCQ
_dVRC
_dOCLCF
_dTEFOD
_dUWO
_dTEFOD
_dCOO
_dOCLCO
_dEBLCP
_dOCLCQ
_dDEBBG
_dDEBSZ
_dOCLCQ
_dOCLCO
_dDG1
019 _a961308287
020 _a9781119043942
_q(electronic bk.)
020 _a1119043948
_q(electronic bk.)
020 _a9781119043966
_q(electronic bk.)
020 _a1119043964
_q(electronic bk.)
020 _a1322166609
_q(electronic bk.)
020 _a9781322166605
_q(electronic bk.)
020 _a9781119043959
_q(electronic bk.)
020 _a1119043956
_q(electronic bk.)
020 _a9781848217584
020 _a1848217587
029 1 _aAU@
_b000053982547
029 1 _aAU@
_b000058372892
029 1 _aCHBIS
_b010441694
029 1 _aCHVBK
_b33408413X
029 1 _aDEBBG
_bBV042987731
029 1 _aDEBSZ
_b475029496
035 _a(OCoLC)892044758
_z(OCoLC)961308287
037 _aD8CDF404-6689-4759-9C8F-A065220E7032
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aTK5105.875.I57
072 7 _aCOM
_x06040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
082 0 4 _a004.678
_222
049 _aMAIN
100 1 _aPerez, Andre.
245 1 0 _aNetwork Security /
_cAndré Perez.
260 _aLondon :
_bISTE ;
_aHoboken, NJ :
_bWiley,
_c2014.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aPrint version record.
520 _aThis book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
504 _aIncludes bibliographical references and index.
650 0 _aInternet
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aInternet
_xSecurity measures.
_2fast
_0(OCoLC)fst01751426
655 4 _aElectronic books.
776 0 8 _iPrint version:
_z9781848217584
856 4 0 _uhttp://dx.doi.org/10.1002/9781119043942
_zWiley Online Library
994 _a92
_bDG1
999 _c21726
_d21685