Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.
The book begins with a brief discussion of network architectures and the functions of layers in a typical network. It then examines vulnerabilities and attacks divided into four categories: header-, protocol-, authentication-, and traffic-based. The author next explores the physical, network, and transport layers of each network as well as the security of several common network applications. The last section recommends several network-based security solutions that can be successfully deployed.
This book uses a define-attack-defend methodology for network security. The author briefly introduces the relevant protocols and follows up with detailed descriptions of known vulnerabilities and possible attack methods. He delineates the threats against the protocol and presents possible solutions. Sample problems and lab experiments based on the concepts allow readers to experiment with attacks and assess the effectiveness of solutions. Two appendices provide further clarification and a companion website is offered which supplements the material.
While most of the books available on this subject focus solely on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions. By focusing on a practical view of network security and examining actual protocols, readers can better understand the vulnerabilities and develop appropriate countermeasures.
"synopsis" may belong to another edition of this title.
Iowa State University, Ames, Iowa, USA
"About this title" may belong to another edition of this title.
Book Description Chapman and Hall/CRC, 2008. HRD. Book Condition: New. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Bookseller Inventory # F9-9781584885436
Book Description Chapman and Hall/CRC, 2016. Hardback. Book Condition: NEW. 9781584885436 This listing is a new book, a title currently in-print which we order directly and immediately from the publisher. Print on Demand title, produced to the highest standard, and there would be a delay in dispatch of around 15 working days. Bookseller Inventory # HTANDREE0249574
Book Description Chapman and Hall/CRC, 2016. Paperback. Book Condition: New. PRINT ON DEMAND Book; New; Publication Year 2016; Not Signed; Fast Shipping from the UK. No. book. Bookseller Inventory # ria9781584885436_lsuk
Book Description Chapman and Hall/CRC, 2008. HRD. Book Condition: New. New Book.Shipped from US within 10 to 14 business days.THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bookseller Inventory # IP-9781584885436
Book Description Chapman and Hall/CRC, 2008. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Introduction to Network Concepts and Threats Network Architecture Network Protocols The Internet Taxonomy of Network-Based Vulnerabilities Lower-Layer Security Physical Network Layer Overview Network Layer Protocols Transport Layer Protocols Application Layer Security Application Layer Overview Email Web Security Remote Access Security Network-Based Mitigation Common Network Security Devices Appendix A Cryptology Appendix B Laboratory Configuration Appendix C Homework Solutions Index. Bookseller Inventory # ABE_book_new_1584885432
Book Description Chapman & Hall, 2008. Hardcover. Book Condition: Brand New. 1st edition. 448 pages. 9.45x6.50x1.18 inches. In Stock. Bookseller Inventory # __1584885432
Book Description Chapman and Hall/CRC, 2008. Hardcover. Book Condition: New. book. Bookseller Inventory # 1584885432
Book Description Chapman and Hall/CRC, 2008. HRD. Book Condition: New. New Book. Delivered from our US warehouse in 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND.Established seller since 2000. Bookseller Inventory # IP-9781584885436
Book Description Chapman and Hall/CRC, 2008. Hardcover. Book Condition: New. 1. Bookseller Inventory # DADAX1584885432
Book Description 2008. Hardcover. Book Condition: New. 1st. 157mm x 33mm x 231mm. Hardcover. Unlike data communications of the past, todaya (TM)s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security .Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. 502 pages. 0.839. Bookseller Inventory # 9781584885436