| 000 | 00935camuu2200277 a 4500 | |
| 001 | 000045587080 | |
| 005 | 20110121161934 | |
| 008 | 100416s2008 ne a b 001 0 eng d | |
| 010 | ▼a 2008012262 | |
| 020 | ▼a 0123744636 | |
| 020 | ▼a 9780123744630 | |
| 035 | ▼a (OCoLC)213480177 | |
| 035 | ▼a (OCoLC)ocn213480177 | |
| 040 | ▼a DLC ▼c DLC ▼d BAKER ▼d BTCTA ▼d YDXCP ▼d C#P ▼d DLC ▼d 211009 ▼d 244002 | |
| 050 | 0 0 | ▼a TK5105.59 ▼b .N338 2008 |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b N4763 | |
| 245 | 0 0 | ▼a Network security : ▼b know it all / ▼c James Joshi ... [et al.]. |
| 260 | ▼a Amsterdam ; ▼a Boston : ▼b Morgan Kaufmann : ▼b Elsevier, ▼c c2008. | |
| 300 | ▼a xiii, 350 p. : ▼b ill. ; ▼c 25 cm. | |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
| 700 | 1 | ▼a Joshi, James B. D. |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 N4763 | 등록번호 121193105 (5회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 N4763 | 등록번호 151296138 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 N4763 | 등록번호 121193105 (5회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 N4763 | 등록번호 151296138 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field’s leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
Feature
- Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise
- Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints
- Presents methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions
- Examples illustrate core security concepts for enhanced comprehension
정보제공 :
목차
Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp
Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp
Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp
Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp
Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp
Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp
Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp
Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp
Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp
Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp
정보제공 :
