Network Security Technologies, Second Edition

时间:2011-08-30 01:35:56
【文件属性】:
文件名称:Network Security Technologies, Second Edition
文件大小:4.37MB
文件格式:PDF
更新时间:2011-08-30 01:35:56
Network
Network Security Technologies, Second Edition


by Kwok T. Fung

Publisher: AUERBACH; 2 edition (October 28, 2004)

http://www.auerbach-publications.com/home.asp



Product Description
Network security development and implementation efforts involve the integration of technologies from seemingly unrelated fields that did not previously have to cross paths or internetwork. Areas such as cryptography, network protocols, and switch and router technology each have established theories and practices; developing expertise in all of these fields is a challenging task. Security professionals need a resource that can help them bring all of these security components together for the benefit of their organizations. Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details each security technology, then discusses its function so you can more easily grasp the function and importance of each technology within the totality of the network security landscape.

Download Description
With the advent of telecommunication and IT technologies coupled with the increasingly dominant roles played by e-commerce in every major industry, the development and implementation efforts in many areas of network security have drawn technologies from more and more seemingly unrelated technical fields that did not previously have to cross path or intimately interwork. These major technical fields include cryptography, network protocols, switch/router technology and information technology, each with already fully developed theories, standards as well as well-established practices. Trying to develop expertise in all of these technical fields is a challenging task. By introducing a unique, hierarchical framework based on the fundamental network security functional elements of confidentiality, authentication, authorization, message integrity and non-repudiation, this book presents the key network security-relevant technologies in these diverse fields in an organized, easy-to-follow fashion which greatly facilitates the understanding of not only the technologies themselves but also their inter-relationships and how they interwork.


http://www.amazon.com/Network-Security-Technologies-Second-Kwok/dp/0849330270/ref=pd_bbs_2?ie=UTF8&s=books&qid=1218238898&sr=8-2



网友评论

  • 有参考价值,谢谢楼主提供