Welcome to UE Central Library

Keep Smiling

Broadband network & device security / Benjamin M. Lail

By: Material type: TextTextSeries: RSA PressPublication details: New York : McGraw-Hill / Osborne, 2002Description: xxiii, 473 pISBN:
  • 9780072194241
Subject(s): DDC classification:
  • 621.3821 L142
Contents:
Broadband Network Security Fundamentals --An Overview of Broadband Communication --A Brief History of telecommunication --That Was Then --This Is Now -- What is Broadband Access? --Existing Broadband Access Technologies --Cable -- DSL --Fixed Wireless --Two-Way Satellite --The Future of Broadband --Fiber Optics --The Importance of Security in Broadband Networks --Security and the Average User -- Securing the Network Infrastructure --Choosing the Right Tools: Security Services and Cryptography --Security Services and Mechanisms --Confidentiality -- Integrity --Authentication --Nonrepudiation -- Authorization and Access Control --Availability --The Basics of Cryptography --Random Number Generation --Symmetric-Key Cryptography -- Message Digests -- Public-Key Cryptography -- Public-Key Cryptography Standards -- Federal Information Processing Standards and Certification -- Store-and-Forward vs. Session-Based Encryption -- Choosing the Appropriate Cryptographic Tools -- Using Stream Ciphers --Using Block Ciphers --Using Message Digests --Using Public-Key Algorithms --Interoperability Notes --How Secure Is Too Secure? --The Need for Security: Network Threats and Countermeasures --Who, What, and Why? Attackers and Their Motivations --When? "The Network Administrator Went Home Hours Ago ..." --Where? The Internet's a Big Place! --Broadband Access vs. Dial-up Access --Categorizing Common Attacks --Passive Attacks vs. Active Attacks --Eavesdropping --Impersonation --Denial of Service.
List(s) this item appears in: Computer_2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books UE-Central Library 621.3821 L142 (Browse shelf(Opens below)) Available T9855

Broadband Network Security Fundamentals --An Overview of Broadband Communication --A Brief History of telecommunication --That Was Then --This Is Now --
What is Broadband Access? --Existing Broadband Access Technologies --Cable --
DSL --Fixed Wireless --Two-Way Satellite --The Future of Broadband --Fiber Optics --The Importance of Security in Broadband Networks --Security and the Average User --
Securing the Network Infrastructure --Choosing the Right Tools: Security Services and Cryptography --Security Services and Mechanisms --Confidentiality --
Integrity --Authentication --Nonrepudiation --
Authorization and Access Control --Availability --The Basics of Cryptography --Random Number Generation --Symmetric-Key Cryptography --
Message Digests --
Public-Key Cryptography --
Public-Key Cryptography Standards --
Federal Information Processing Standards and Certification --
Store-and-Forward vs. Session-Based Encryption --
Choosing the Appropriate Cryptographic Tools --
Using Stream Ciphers --Using Block Ciphers --Using Message Digests --Using Public-Key Algorithms --Interoperability Notes --How Secure Is Too Secure? --The Need for Security: Network Threats and Countermeasures --Who, What, and Why? Attackers and Their Motivations --When? "The Network Administrator Went Home Hours Ago ..." --Where? The Internet's a Big Place! --Broadband Access vs. Dial-up Access --Categorizing Common Attacks --Passive Attacks vs. Active Attacks --Eavesdropping --Impersonation --Denial of Service.

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk