Bild 1 von 1

Galerie
Bild 1 von 1

Introduction to Computer Networks and Cybersecurity
US $15,50
Ca.EUR 13,37
Artikelzustand:
Neu
Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte Seiten. Genauere Einzelheiten entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos USPS Media MailTM.
Standort: Norcross, Georgia, USA
Lieferung:
Lieferung zwischen Fr, 1. Aug und Mi, 6. Aug nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:365622241320
Artikelmerkmale
- Artikelzustand
- Release Year
- 2013
- Book Title
- Introduction to Computer Networks and Cybersecurity
- ISBN
- 9781466572133
Über dieses Produkt
Product Identifiers
Publisher
Taylor & Francis Group
ISBN-10
1466572132
ISBN-13
9781466572133
eBay Product ID (ePID)
117287279
Product Key Features
Number of Pages
1336 Pages
Language
English
Publication Name
Introduction to Computer Networks and Cybersecurity
Subject
Networking / General, Security / General, Security / Networking, Information Technology
Publication Year
2013
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
2.2 in
Item Weight
111.5 Oz
Item Length
11.4 in
Item Width
8.7 in
Additional Product Features
Intended Audience
College Audience
LCCN
2012-036920
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
An Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. Emerging Technologies: Network and Information Infrastructure Virtualization. Unified Communications and Multimedia Protocols. Glossary of Acronyms. Index.
Synopsis
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint(R) animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? A guide to computer networks and cybersecurity, this book highlights the interconnections between the two to demystify the complexities of designing secure modern networks. The book walks users through the fundamentals of networks, from an overview of Internet architecture through the protocol layers. It then delves into cybersecurity, covering both attack and defense techniques, and closes with a look at the emerging technologies that will alter the current state of multimedia communication and data center/cloud computing.
LC Classification Number
TK5105.59
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
Goodwill of North Georgia
99% positive Bewertungen•28.960 Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (7.614)
- a***i (13883)- Bewertung vom Käufer.Letzter MonatBestätigter KaufExceptionally Positive Experience Buying From This Seller, Exemplary Fast Early Delivery, Perfect packing job, Exactly as Described, Great Customer Communication and Service, EXCELLENT TRANSACTION, Fair Prices, Highly Recommend Buying From This Seller!!! YOUR the BEST seller on e-Bay
- 4***o (634)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufBook is in very good condition, as advertized, looks very clean, no markings or highlighting. Shipped next day, packaged very well, much better than Amazon these days. Good price, i always try to buy from Goodwill before other sellers and have never been disappointed. Thanks.
- g***a (2075)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufThe book arrived in good condition well packed and exactly as represented by the seller. A good value for the price. I would definitely patronize this seller again for similar items in the future.
Noch mehr entdecken:
- Computer & Internetliteratur auf Deutsch,
- Computer & Internetliteratur über Programmiersprache,
- Computer & Internetliteratur über Web & Internet,
- Computer & Internetliteratur über Hardware,
- Computer & Internetliteratur über Apple,
- Computer & Internet Taschenbücher,
- Computer- & - Internet-Sachbuch Bücher,
- Computer- & - Internet-Sachbuch Bücher Internet-Genre,
- Computer- & - Internet-Sachbuch Ab 2010 Bücher,
- Computer- & - Internet-Sachbuch Bücher auf Deutsch Hardware