Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Technologies, Second Edition

Buy

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.

With the advent of telecommunication and IT technologies coupled with the increasingly dominant roles played by e-commerce in every major industry, the development and implementation efforts in many areas of network security have drawn technologies from more and more seemingly unrelated technical fields that did not previously have to cross path or intimately interwork. These major technical fields include cryptography, network protocols, switch/router technology and information technology, each with already fully developed theories, standards as well as well-established practices. Trying to develop expertise in all of these technical fields is a challenging task. By introducing a unique, hierarchical framework based on the fundamental network security functional elements of confidentiality, authentication, authorization, message integrity and non-repudiation, this book presents the key network security-relevant technologies in these diverse fields in an organized, easy-to-follow fashion which greatly facilitates the understanding of not only the technologies themselves but also their inter-relationships and how they interwork.

ABOUT THE AUTHOR
Kwok T. Fung worked for AT&T Bell Laboratories/AT&T Laboratories in data networking and telecommunications for more than 20 years. He also taught computer science for a number of years at the University of Windsor, Ontario, Canada. He coauthored the book Computer Design and Implementation by Computer Science Press and has several papers published in technical journals and conference proceedings. He has also coauthored several patent applications. He received his M.S. and Ph.D. degrees in computer engineering from Cornell University and his B.S. in electrical engineering from the University of Manitoba, Canada.
(HTML tags aren't allowed.)

Mathematical Optimization in Computer Graphics and Vision (The Morgan Kaufmann Series in Computer Graphics)
Mathematical Optimization in Computer Graphics and Vision (The Morgan Kaufmann Series in Computer Graphics)

Mathematical optimization is used in nearly all computer graphics applications, from computer vision to animation. This book teaches readers the core set of techniques that every computer graphics professional should understand in order to envision and expand the boundaries of what is possible in their work.

Study of this
...

The Future of Public Housing: Ongoing Trends in the East and the West
The Future of Public Housing: Ongoing Trends in the East and the West

Public housing was once an important strand in western housing policies, but is seldom seen as a mainstream policy instrument for the future. In contrast, in many East Asian countries large public housing programs are underway. Behind these generalizations, there are exceptions, too. By including perspectives of scholars from across the...

War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
The histories of modern war and childhood were the result of competing urgencies. According to ideals of childhood widely accepted throughout the world by 1900, children should have been protected, even hidden, from conflict and danger. Yet at a time when modern ways of childhood became increasingly possible for economic, social, and political...

No Fluff, Just Stuff Anthology (Pragmatic Programmers)
No Fluff, Just Stuff Anthology (Pragmatic Programmers)
Twenty-seven weekends a year, the No Fluff, Just Stuff conference rolls into another town, featuring the world's best technical speakers and writers. Up until now, you had to go to one of the shows to soak up their collective wisdom. Now, you can hold it in the palm of your hand. The No Fluff, Just Stuff Anthology represents topics...
Microsoft SharePoint 2010 Business Application Blueprints
Microsoft SharePoint 2010 Business Application Blueprints
This book will dive into a diverse set of real-world scenarios to deliver sample business solutions that can serve as the foundation for your own solutions. It draws from the author's extensive experience with SharePoint to leverage the platform's underlying services to provide solutions that can support social...
Information: A Very Short Introduction
Information: A Very Short Introduction

We live in a society that is awash with information, but few of us really understand what information is. In this Very Short Introduction, one of the world's leading authorities on the philosophy of information and on information ethics, Luciano Floridi, offers an illuminating exploration of information as it relates to both...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy