Master the most challenging elements of the CCNA exam to pass on your very first try!The CCNA goes deep on networking and security. Acing the CCNA Exam, Volume 2 gives you exactly what you need to navigate the most challenging p...Loe edasi...
(Ilmumisaeg: 26-Aug-2024, Paperback / softback, Kirjastus: River Publishers, ISBN-13: 9788770041959)
This book unveils a blueprint for safeguarding the very backbone of modern communication networks. It offers a roadmap towards fortifying SDN infrastructures against the relentless onslaught of cyber threats, ensuring resilience and reliability in an...Loe edasi...
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN. Partial deploymen...Loe edasi...
(Ilmumisaeg: 12-Apr-2024, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031555169)
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process c...Loe edasi...
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from...Loe edasi...
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture,...Loe edasi...
Learn Wireshark provides an overview of protocol analysis. Youll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export,...Loe edasi...
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practica...Loe edasi...
Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig
Sari: Information Security and Cryptography
(Ilmumisaeg: 17-May-2022, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031052873)
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture,...Loe edasi...
Direct from Cisco, this comprehensive book guides networking professionals through all aspects of planning, implementing, and operating Cisco Software Defined Access, helping them use intent-based networking, SD-Access, Cisco ISE, and Cisco DNA...Loe edasi...
Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported...Loe edasi...
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everyw...Loe edasi...
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will b...Loe edasi...
Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng, O. P. Verma
(Ilmumisaeg: 07-Feb-2020, Other digital carrier, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781119555759)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will...Loe edasi...
Sari: World Scientific Series In Digital Forensics And Cybersecurity
(Ilmumisaeg: 30-Aug-2019, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811205910)
The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Learn Wireshark provides a solid overview of basic protocol analysis. The book shows you how to navigate the Wireshark interface, so you can confidently examine common protocols such as TCP, IP and ICMP. Youll learn tips on how to use display and...Loe edasi...
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this conce...Loe edasi...