Foto 1 di 1

Galleria
Foto 1 di 1

Ne hai uno da vendere?
Introduction to Computer Networks and Cybersecurity
US $15,50
CircaEUR 13,37
Condizione:
Nuovo
Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o danneggiate. Per maggiori dettagli, consulta l'inserzione del venditore.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: Norcross, Georgia, Stati Uniti
Consegna:
Consegna prevista tra il ven 1 ago e il mer 6 ago a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:365622241320
Specifiche dell'oggetto
- Condizione
- Release Year
- 2013
- Book Title
- Introduction to Computer Networks and Cybersecurity
- ISBN
- 9781466572133
Informazioni su questo prodotto
Product Identifiers
Publisher
Taylor & Francis Group
ISBN-10
1466572132
ISBN-13
9781466572133
eBay Product ID (ePID)
117287279
Product Key Features
Number of Pages
1336 Pages
Language
English
Publication Name
Introduction to Computer Networks and Cybersecurity
Subject
Networking / General, Security / General, Security / Networking, Information Technology
Publication Year
2013
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
2.2 in
Item Weight
111.5 Oz
Item Length
11.4 in
Item Width
8.7 in
Additional Product Features
Intended Audience
College Audience
LCCN
2012-036920
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
An Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. Emerging Technologies: Network and Information Infrastructure Virtualization. Unified Communications and Multimedia Protocols. Glossary of Acronyms. Index.
Synopsis
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint(R) animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? A guide to computer networks and cybersecurity, this book highlights the interconnections between the two to demystify the complexities of designing secure modern networks. The book walks users through the fundamentals of networks, from an overview of Internet architecture through the protocol layers. It then delves into cybersecurity, covering both attack and defense techniques, and closes with a look at the emerging technologies that will alter the current state of multimedia communication and data center/cloud computing.
LC Classification Number
TK5105.59
Descrizione dell'oggetto fatta dal venditore
Informazioni sul venditore professionale
Informazioni su questo venditore
Goodwill of North Georgia
99% di Feedback positivi•29 mila oggetti venduti
Registrato come venditore professionale
Feedback sul venditore (7.614)
- a***i (13883)- Feedback lasciato dall'acquirente.Mese scorsoAcquisto verificatoExceptionally Positive Experience Buying From This Seller, Exemplary Fast Early Delivery, Perfect packing job, Exactly as Described, Great Customer Communication and Service, EXCELLENT TRANSACTION, Fair Prices, Highly Recommend Buying From This Seller!!! YOUR the BEST seller on e-Bay
- 4***o (634)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoBook is in very good condition, as advertized, looks very clean, no markings or highlighting. Shipped next day, packaged very well, much better than Amazon these days. Good price, i always try to buy from Goodwill before other sellers and have never been disappointed. Thanks.
- g***a (2075)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoThe book arrived in good condition well packed and exactly as represented by the seller. A good value for the price. I would definitely patronize this seller again for similar items in the future.