Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Technologies, Second Edition

Buy

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.

With the advent of telecommunication and IT technologies coupled with the increasingly dominant roles played by e-commerce in every major industry, the development and implementation efforts in many areas of network security have drawn technologies from more and more seemingly unrelated technical fields that did not previously have to cross path or intimately interwork. These major technical fields include cryptography, network protocols, switch/router technology and information technology, each with already fully developed theories, standards as well as well-established practices. Trying to develop expertise in all of these technical fields is a challenging task. By introducing a unique, hierarchical framework based on the fundamental network security functional elements of confidentiality, authentication, authorization, message integrity and non-repudiation, this book presents the key network security-relevant technologies in these diverse fields in an organized, easy-to-follow fashion which greatly facilitates the understanding of not only the technologies themselves but also their inter-relationships and how they interwork.

ABOUT THE AUTHOR
Kwok T. Fung worked for AT&T Bell Laboratories/AT&T Laboratories in data networking and telecommunications for more than 20 years. He also taught computer science for a number of years at the University of Windsor, Ontario, Canada. He coauthored the book Computer Design and Implementation by Computer Science Press and has several papers published in technical journals and conference proceedings. He has also coauthored several patent applications. He received his M.S. and Ph.D. degrees in computer engineering from Cornell University and his B.S. in electrical engineering from the University of Manitoba, Canada.
(HTML tags aren't allowed.)

Professional Perl Programming
Professional Perl Programming
Perl is one of the most important and powerful languages available today, and Professional Perl Programming offers an in-depth guide to exploiting some of its best features. With a densely packed tutorial straight from the experts, it is suitable for any experienced developer who wants to get more from this language.

Weighing in at...

Microsoft Windows Vista Unleashed
Microsoft Windows Vista Unleashed
Microsoft® Windows® Vista™ Unleashed is a book for people, like you, who don’t consider themselves to be “average users.” It’s a book for anyone who finds that doing things the official way is slower, less efficient, and less powerful because Windows Vista was designed from the ground up to avoid confusing...
The MPEG-21 Book
The MPEG-21 Book
Understand the MPEG-21 Multimedia Framework, the standard for the creation, delivery and consumption of multimedia.

This text is the comprehensive guide to MPEG-21, the technology that provides an open framework for multimedia applications. Whereas previous MPEG standards defined compression techniques, MPEG-21...


Side Bias: A Neuropsychological Perspective
Side Bias: A Neuropsychological Perspective

`Rather than being an esoteric aspect of brain function, lateralization is a fundamental characteristic of the vertebrate brain essential to a broad range of neural and behavioral processes.' Professor Lesley J. Rogers, Chapter 1 of Side Bias: A Neuropsychological Perspective. This volume contains 14 chapters from a...

Bluetooth Application Programming with the Java APIs Essentials Edition (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs Essentials Edition (The Morgan Kaufmann Series in Networking)
Bluetooth wireless technology is a short-range radio standard that provides new opportunities for wireless devices. Originally, Bluetooth wireless technology was designed as a way of eliminating the cables attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized that...
Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy