Welcome to UE Central Library

Keep Smiling

Broadband network & device security (Record no. 16255)

MARC details
000 -LEADER
fixed length control field 02081nam a22001937a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200907100828.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181126b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780072194241
040 ## - CATALOGING SOURCE
Transcribing agency PK-IsLIS
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.3821
Item number L142
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Lail, Benjamin M.
245 ## - TITLE STATEMENT
Title Broadband network & device security
Statement of responsibility, etc / Benjamin M. Lail
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc McGraw-Hill / Osborne,
Date of publication, distribution, etc 2002
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 473 p.
490 ## - SERIES STATEMENT
Series statement RSA Press
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks -- Security measures. Broadband communication systems.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Broadband Network Security Fundamentals --An Overview of Broadband Communication --A Brief History of telecommunication --That Was Then --This Is Now --<br/>What is Broadband Access? --Existing Broadband Access Technologies --Cable --<br/>DSL --Fixed Wireless --Two-Way Satellite --The Future of Broadband --Fiber Optics --The Importance of Security in Broadband Networks --Security and the Average User --<br/>Securing the Network Infrastructure --Choosing the Right Tools: Security Services and Cryptography --Security Services and Mechanisms --Confidentiality --<br/>Integrity --Authentication --Nonrepudiation --<br/>Authorization and Access Control --Availability --The Basics of Cryptography --Random Number Generation --Symmetric-Key Cryptography --<br/>Message Digests --<br/>Public-Key Cryptography --<br/>Public-Key Cryptography Standards --<br/>Federal Information Processing Standards and Certification --<br/>Store-and-Forward vs. Session-Based Encryption --<br/>Choosing the Appropriate Cryptographic Tools --<br/>Using Stream Ciphers --Using Block Ciphers --Using Message Digests --Using Public-Key Algorithms --Interoperability Notes --How Secure Is Too Secure? --The Need for Security: Network Threats and Countermeasures --Who, What, and Why? Attackers and Their Motivations --When? "The Network Administrator Went Home Hours Ago ..." --Where? The Internet's a Big Place! --Broadband Access vs. Dial-up Access --Categorizing Common Attacks --Passive Attacks vs. Active Attacks --Eavesdropping --Impersonation --Denial of Service.<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 26.11.2018 U.E.24143 621.3821 L142 T9855 26.11.2018 26.11.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk