Main background
img

The source of the book

This book is published for the public benefit under a Creative Commons license, or with the permission of the author or publisher. If you have any objections to its publication, please contact us.

img
img

Network Security Essentials

(0)

Number Of Downloads:

62

Number Of Reads:

12

Language:

English

File Size:

3.06 MB

Category:

Technology

Section:

Pages:

2

Quality:

excellent

Views:

1108

img

Quate

img

Review

Save

Share

Book Description

Network Security Essentials: Applications and Standards

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition. Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

img

William Stallings

He maintains a website titled Computer Science Student Resource. He has authored 17 titles, and counting revised editions, a total of over 40 books on these subjects. He has been a technical contributor, technical manager, and an executive with several high-technology firms. He works as an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions

Read More
Sorry, this book file is currently unavailable. We're working on a full website update, and the file will be uploaded soon. Thank you for your patience and interest.

Rate Now

1 Stars

2 Stars

3 Stars

4 Stars

5 Stars

Comments

User Avatar
img

Be the first to leave a comment and earn 5 points

instead of 3

Quotes

Top Rated

Latest

Quate

img

Be the first to leave a quote and earn 10 points

instead of 3