Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Technologies, Second Edition

Buy

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.

With the advent of telecommunication and IT technologies coupled with the increasingly dominant roles played by e-commerce in every major industry, the development and implementation efforts in many areas of network security have drawn technologies from more and more seemingly unrelated technical fields that did not previously have to cross path or intimately interwork. These major technical fields include cryptography, network protocols, switch/router technology and information technology, each with already fully developed theories, standards as well as well-established practices. Trying to develop expertise in all of these technical fields is a challenging task. By introducing a unique, hierarchical framework based on the fundamental network security functional elements of confidentiality, authentication, authorization, message integrity and non-repudiation, this book presents the key network security-relevant technologies in these diverse fields in an organized, easy-to-follow fashion which greatly facilitates the understanding of not only the technologies themselves but also their inter-relationships and how they interwork.

ABOUT THE AUTHOR
Kwok T. Fung worked for AT&T Bell Laboratories/AT&T Laboratories in data networking and telecommunications for more than 20 years. He also taught computer science for a number of years at the University of Windsor, Ontario, Canada. He coauthored the book Computer Design and Implementation by Computer Science Press and has several papers published in technical journals and conference proceedings. He has also coauthored several patent applications. He received his M.S. and Ph.D. degrees in computer engineering from Cornell University and his B.S. in electrical engineering from the University of Manitoba, Canada.
(HTML tags aren't allowed.)

Political Communication in Britain: Campaigning, Media and Polling in the 2017 General Election
Political Communication in Britain: Campaigning, Media and Polling in the 2017 General Election
Political Communication in Britain is a now established series of nine books, the first of which appeared in the aftermath of the 1979 General Election. This book follows the structure of previous volumes and features commentaries and assessments from the pollsters who monitored voter opinion during the...
Handbook on International Trade Policy (Elgar Original Reference)
Handbook on International Trade Policy (Elgar Original Reference)

Controversy over the conduct and coordination of international trade policy has become a politically charged issue in current times. At the World Trade Organization Ministerial Conference in Seattle in 1999, groups from civil society went to the barricades to protest various facets of ‘globalization’. Similar spectacles have been...

Understanding Ethics in Applied Behavior Analysis: Practical Applications
Understanding Ethics in Applied Behavior Analysis: Practical Applications

Drawing upon combined 35 years of clinical experience as well as the reflections of colleagues in the field, Understanding Ethics in Applied Behavior Analysis provides the foundation for a lifelong journey of ethical practice in service for individuals with autism spectrum disorder (ASD) and other developmental disabilities....


Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

New Frontiers in Integrated Solid Earth Sciences (International Year of Planet Earth)
New Frontiers in Integrated Solid Earth Sciences (International Year of Planet Earth)

Man’s intensifying use of the Earth’s habitat has led to an urgent need for scientifically advanced ‘geo-prediction systems’ that accurately locate subsurface resources and forecast the timing and magnitude of earthquakes, volcanic eruptions and land subsidence.

As advances in the earth sciences lead to...

Pocket Data Mining: Big Data on Small Devices (Studies in Big Data)
Pocket Data Mining: Big Data on Small Devices (Studies in Big Data)

Owing to continuous advances in the computational power of handheld devices like smartphones and tablet computers, it has become possible to perform Big Data operations including modern data mining processes onboard these small devices. A decade of research has proved the feasibility of what has been termed as Mobile Data...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy