1 option
Introduction to computer networks and cybersecurity / by Chwan-Hwa (John) Wu and J. David Irwin.
- Format:
- Book
- Author/Creator:
- Wu, Chwan-Hwa (John), author.
- Irwin, J. David, 1939- author.
- Language:
- English
- Subjects (All):
- Computer networks.
- Computer networks--Security measures.
- Physical Description:
- 1 online resource (1373 p.)
- Edition:
- 1st edition
- Place of Publication:
- Boca Raton, FL : CRC Press, an imprint of Taylor and Francis, 2013.
- Language Note:
- English
- System Details:
- text file
- Summary:
- If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.
- Contents:
- Front Cover; Contents; To the Student; To the Instructor; Highlights of the Text; Organization Supports both Hybrid and Other Well-Known Approaches; Pedagogy; Supplements; Acknowledgments; An Introduction to Information Networks; Chapter 1 - The Application Layer; Chapter 2 - DNS and Active Directory; Chapter 3 - XML-Based Web Services; Chapter 4 - Socket Programming; Chapter 5 - Peer-to-Peer (P2P) Networks and Applications; Chapter 6 - The Data Link Layer and Physical Layer; Chapter 7 - The Ethernet and Switches; Chapter 8 - Virtual LAN, Class of Service, and Multilayer Networks
- Chapter 9 - Wireless and Mobile NetworksChapter 10 - The Network Layer; Chapter 11 - IPv6; Chapter 12 - Routing and Interior Gateways; Chapter 13 - Border Gateway Routing; Chapter 14 - The Transport Layer; Chapter 15 - Packet Loss Recovery; Chapter 16 - TCP Congestion Control; Chapter 17 - Cybersecurity Overview; Chapter 18 - Firewalls; Chapter 19 - Intrusion Detection/Prevention System; Chapter 20 - Hash and Authentication; Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security; Chapter 22 - Public Key Cryptography, Infrastructure and Certificates
- Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer SecurityChapter 24 - Virtual Private Networks for Network Layer Security; Chapter 25 - Network Access Control and Wireless Network Security; Chapter 26 - Cyber Threats and Their Defense; Chapter 27 - Network and Information Infrastructure Virtualization; Chapter 28 - Unified Communications and Multimedia Protocols; Glossary of Acronyms; Back Cover
- Notes:
- Description based upon print version of record.
- Includes bibliographical references.
- Description based on print version record.
- ISBN:
- 9780429101311
- 0429101317
- 9781466572140
- 1466572140
- 9781466572133
- 1466572132
- OCLC:
- 899501242
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.