Broadband network & device security (Record no. 16255)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02081nam a22001937a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200907100828.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181126b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780072194241 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK-IsLIS |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 621.3821 |
Item number | L142 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Lail, Benjamin M. |
245 ## - TITLE STATEMENT | |
Title | Broadband network & device security |
Statement of responsibility, etc | / Benjamin M. Lail |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New York : |
Name of publisher, distributor, etc | McGraw-Hill / Osborne, |
Date of publication, distribution, etc | 2002 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiii, 473 p. |
490 ## - SERIES STATEMENT | |
Series statement | RSA Press |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks -- Security measures. Broadband communication systems. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Broadband Network Security Fundamentals --An Overview of Broadband Communication --A Brief History of telecommunication --That Was Then --This Is Now --<br/>What is Broadband Access? --Existing Broadband Access Technologies --Cable --<br/>DSL --Fixed Wireless --Two-Way Satellite --The Future of Broadband --Fiber Optics --The Importance of Security in Broadband Networks --Security and the Average User --<br/>Securing the Network Infrastructure --Choosing the Right Tools: Security Services and Cryptography --Security Services and Mechanisms --Confidentiality --<br/>Integrity --Authentication --Nonrepudiation --<br/>Authorization and Access Control --Availability --The Basics of Cryptography --Random Number Generation --Symmetric-Key Cryptography --<br/>Message Digests --<br/>Public-Key Cryptography --<br/>Public-Key Cryptography Standards --<br/>Federal Information Processing Standards and Certification --<br/>Store-and-Forward vs. Session-Based Encryption --<br/>Choosing the Appropriate Cryptographic Tools --<br/>Using Stream Ciphers --Using Block Ciphers --Using Message Digests --Using Public-Key Algorithms --Interoperability Notes --How Secure Is Too Secure? --The Need for Security: Network Threats and Countermeasures --Who, What, and Why? Attackers and Their Motivations --When? "The Network Administrator Went Home Hours Ago ..." --Where? The Internet's a Big Place! --Broadband Access vs. Dial-up Access --Categorizing Common Attacks --Passive Attacks vs. Active Attacks --Eavesdropping --Impersonation --Denial of Service.<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 26.11.2018 | U.E.24143 | 621.3821 L142 | T9855 | 26.11.2018 | 26.11.2018 | Books |