My Account Log in

1 option

Introduction to computer networks and cybersecurity / by Chwan-Hwa (John) Wu and J. David Irwin.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Wu, Chwan-Hwa (John), author.
Irwin, J. David, 1939- author.
Language:
English
Subjects (All):
Computer networks.
Computer networks--Security measures.
Physical Description:
1 online resource (1373 p.)
Edition:
1st edition
Place of Publication:
Boca Raton, FL : CRC Press, an imprint of Taylor and Francis, 2013.
Language Note:
English
System Details:
text file
Summary:
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.
Contents:
Front Cover; Contents; To the Student; To the Instructor; Highlights of the Text; Organization Supports both Hybrid and Other Well-Known Approaches; Pedagogy; Supplements; Acknowledgments; An Introduction to Information Networks; Chapter 1 - The Application Layer; Chapter 2 - DNS and Active Directory; Chapter 3 - XML-Based Web Services; Chapter 4 - Socket Programming; Chapter 5 - Peer-to-Peer (P2P) Networks and Applications; Chapter 6 - The Data Link Layer and Physical Layer; Chapter 7 - The Ethernet and Switches; Chapter 8 - Virtual LAN, Class of Service, and Multilayer Networks
Chapter 9 - Wireless and Mobile NetworksChapter 10 - The Network Layer; Chapter 11 - IPv6; Chapter 12 - Routing and Interior Gateways; Chapter 13 - Border Gateway Routing; Chapter 14 - The Transport Layer; Chapter 15 - Packet Loss Recovery; Chapter 16 - TCP Congestion Control; Chapter 17 - Cybersecurity Overview; Chapter 18 - Firewalls; Chapter 19 - Intrusion Detection/Prevention System; Chapter 20 - Hash and Authentication; Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security; Chapter 22 - Public Key Cryptography, Infrastructure and Certificates
Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer SecurityChapter 24 - Virtual Private Networks for Network Layer Security; Chapter 25 - Network Access Control and Wireless Network Security; Chapter 26 - Cyber Threats and Their Defense; Chapter 27 - Network and Information Infrastructure Virtualization; Chapter 28 - Unified Communications and Multimedia Protocols; Glossary of Acronyms; Back Cover
Notes:
Description based upon print version of record.
Includes bibliographical references.
Description based on print version record.
ISBN:
9780429101311
0429101317
9781466572140
1466572140
9781466572133
1466572132
OCLC:
899501242

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account