skip to content
Network security technologies Preview this item
ClosePreview this item
Checking...

Network security technologies

Author: K T Fung
Publisher: Boca Raton, FL : Auerbach Publications, ©2005.
Edition/Format:   Print book : English : 2nd edView all editions and formats
Summary:
"Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: K T Fung
ISBN: 0849330270 9780849330278
OCLC Number: 55644580
Description: xx, 273 pages : illustrations ; 25 cm
Contents: 1. Introduction --
2. Basic confidentiality technologies --
3. Basic authentication technologies --
4. Basic authorization technologies --
5. Basic message integrity technologies --
6. Basic non-repudiation technologies --
7. Enhanced technologies --
8. Integrated technologies --
9. Network security architectures --
10. WLAN security architecture --
11. Network security implementation topics --
App. A. Security technologies : a hierarchical guide --
App. B. NSA and SNAC router security configuration guide summary (from National Security Agency/System and Network Attack Center) --
App. C. Key network security terms and definitions --
App. D. List of common TCP and UDP well-known ports.
Responsibility: Kwok T. Fung.
More information:

Abstract:

Presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/55644580> # Network security technologies
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "55644580" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1028470#Place/boca_raton_fl> ; # Boca Raton, FL
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/1028470#Topic/computernetwerken> ; # Computernetwerken
   schema:about <http://experiment.worldcat.org/entity/work/data/1028470#Topic/computerbeveiliging> ; # Computerbeveiliging
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:bookEdition "2nd ed." ;
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2005" ;
   schema:creator <http://viaf.org/viaf/30135732> ; # Kwok T. Fung
   schema:datePublished "2005" ;
   schema:description ""This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their relationships. It introduces and details each security technology, then discusses their functionality so that you can more easily grasp the importance of each within the totality of the network security landscape."--Jacket."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1028470> ;
   schema:inLanguage "en" ;
   schema:name "Network security technologies"@en ;
   schema:productID "55644580" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/55644580#PublicationEvent/boca_raton_fl_auerbach_publications_2005> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1028470#Agent/auerbach_publications> ; # Auerbach Publications
   schema:reviews <http://www.worldcat.org/title/-/oclc/55644580#Review/-1405294136> ;
   schema:workExample <http://worldcat.org/isbn/9780849330278> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/55644580> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1028470#Agent/auerbach_publications> # Auerbach Publications
    a bgn:Agent ;
   schema:name "Auerbach Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/1028470#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
   schema:name "Computerbeveiliging"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/30135732> # Kwok T. Fung
    a schema:Person ;
   schema:familyName "Fung" ;
   schema:givenName "Kwok T." ;
   schema:givenName "K. T." ;
   schema:name "Kwok T. Fung" ;
    .

<http://worldcat.org/isbn/9780849330278>
    a schema:ProductModel ;
   schema:isbn "0849330270" ;
   schema:isbn "9780849330278" ;
    .

<http://www.worldcat.org/title/-/oclc/55644580#Review/-1405294136>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/55644580> ; # Network security technologies
   schema:reviewBody ""Network Security Technologies, Second Edition presents key security technologies from diverse fields, using an organized, hierarchical framework that enables you to understand security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide."" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.