Designing network security

By: Kaeo, MerikeMaterial type: TextTextPublication details: Delhi : Pearson Education., 2004Edition: 2nd EditionDescription: xxiii, 745 p. : illustrationsISBN: 1587051176 ; 9781587051173; 9788129703941 ; 8129703947Subject(s): Computer networks -- Security measures | Internet -- Security measures | Computer security | Computer Sicherheit | Rechnernetze | Redes de computadoras -- Medidas de seguridadDDC classification: 004.6
Contents:
Basic cryptography -- Security technologies -- Applying security technologies to real networks -- Routing protocol security -- Threats in an enterprise network -- Considerations for a site security policy -- Design and implementation of the corporate security policy -- Incident handling -- Securing the corporate network infrastructure -- Securing Internet access -- Securing remote dial-in access -- Securing VPN, wireless, and VoIP networks.
Summary: In 'Designing Network Security' Merike Kaeo enables readers to gain a comprehensive view of network security issues and concepts, then goes on to show how specific implementations based on individual network needs can be mastered.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Reference Books Reference Books Main Library
Reference
Reference 004.6 KAE (Browse shelf(Opens below)) Available 009529
Total holds: 0

Included Index.

Basic cryptography --
Security technologies --
Applying security technologies to real networks --
Routing protocol security --
Threats in an enterprise network --
Considerations for a site security policy --
Design and implementation of the corporate security policy --
Incident handling --
Securing the corporate network infrastructure --
Securing Internet access --
Securing remote dial-in access --
Securing VPN, wireless, and VoIP networks.

In 'Designing Network Security' Merike Kaeo enables readers to gain a comprehensive view of network security issues and concepts, then goes on to show how specific implementations based on individual network needs can be mastered.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© University of Vavuniya

---