menu
{ "item_title" : "Network Security", "item_author" : [" André Pérez "], "item_description" : "This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/84/821/758/1848217587_b.jpg", "price_data" : { "retail_price" : "177.95", "online_price" : "177.95", "our_price" : "177.95", "club_price" : "177.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Network Security|André Pérez

Network Security

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.

Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.

The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

This item is Non-Returnable

Details

  • ISBN-13: 9781848217584
  • ISBN-10: 1848217587
  • Publisher: Wiley-Iste
  • Publish Date: November 2014
  • Dimensions: 9.5 x 6.4 x 0.9 inches
  • Shipping Weight: 1.32 pounds
  • Page Count: 304

Related Categories

You May Also Like...

    1

BAM Customer Reviews