語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network securityknow it all /
~
Joshi, James B. D.
Network securityknow it all /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Network securityby James Joshi ... [et al.].
其他題名:
know it all /
其他作者:
Joshi, James B. D.
出版者:
Burlington, MA, USA :Morgan Kaufmann,c2008.
面頁冊數:
1 v.
標題:
Computer networksSecurity measures.
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123744630
ISBN:
9780123744630
Network securityknow it all /
Network security
know it all /[electronic resource] :by James Joshi ... [et al.]. - Burlington, MA, USA :Morgan Kaufmann,c2008. - 1 v.
Includes bibliographical references and index.
Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp.
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2008.
Mode of access: World Wide Web.
ISBN: 9780123744630
Source: 155972:156134Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
185597
Computer networks
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.59 / .N338 2008eb
Dewey Class. No.: 005.8
Network securityknow it all /
LDR
:03780cmm 2200349Ia 4500
001
257041
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
100818s2008 mau ob 001 0 eng d
020
$a
9780123744630
020
$a
0123744636
029
1
$a
NZ1
$b
12541561
029
1
$a
AU@
$b
000043178442
035
$a
(OCoLC)228301073
035
$a
ocn228301073
037
$a
155972:156134
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.N338 2008eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Network security
$h
[electronic resource] :
$b
know it all /
$c
by James Joshi ... [et al.].
260
$a
Burlington, MA, USA :
$b
Morgan Kaufmann,
$c
c2008.
300
$a
1 v.
504
$a
Includes bibliographical references and index.
505
0
$a
Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp.
520
$a
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2008.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on May 16, 2008).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
655
7
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Joshi, James B. D.
$3
375516
710
2
$a
ScienceDirect (Online service)
$3
307425
776
1
$c
Original
$z
9780123744630
$z
0123744636
$w
(DLC) 2008012262
$w
(OCoLC)213480177
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9780123744630
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123744630
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000040160
電子館藏
1圖書
電子書
EB TK5105.59 .N338 2008eb 2008
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9780123744630
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123744630
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入