|
![]() |
|||
|
||||
OverviewGet the inside edge on the latest advances in the field of computer network security with the help of this new book! Comprehensive in scope, it is an essential guide to all facets of information security ranging from basic network technology to the broad applications of network security used in e-commerce, Internet security, and enterprise systems. Readers will learn about risk and threat analysis, as well as technologies such as access control, authentication, encryption and key distribution. Planning, installing, and operating a secure system is also covered. Highlights include lessons learned from September 11, 2001. Coverage concludes with a look at future trends, including global terror and proactive solutions. Full Product DetailsAuthor: Gordon Snyder , Terry PardoePublisher: Cengage Learning, Inc Imprint: Delmar Cengage Learning Edition: New edition Dimensions: Width: 18.90cm , Height: 1.80cm , Length: 23.50cm Weight: 0.798kg ISBN: 9781401882143ISBN 10: 1401882145 Pages: 496 Publication Date: 05 October 2004 Audience: General/trade , Professional and scholarly , General , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: Awaiting stock ![]() Table of ContentsReviewsPART ONE: Basic Computer Technology. Introduction - From Teleprocessing to Client Server Computing. Operating Systems and Applications. Networks and Networking. PART TWO: Risk and Threat Analysis. Risk, Analysis, and Special Concerns. Part Three: The technology of Security. Access Control. Authentication. Encryption. PKI and Key Distribution. Security Devices and Software. PART FOUR: Network Security. Physical and Data Link Layer Security. Security at the Network Layer - Internet Security. Application Level Security. PART FIVE: Application and Service Supply Security. Security and E-commerce. Enterprise Systems and Solutions. The Telecommunications Industry. PART SIX: Planning Secure Systems and Implementing Effective Solutions. Planning for Security. Design Aspects. Installation of a Secure System. PART SEVEN: Operating a Successful and Secure System. Operation and Support. Monitoring on Going Operation. PART EIGHT: The Future. Future Trends: Threats and Technologies. Author InformationGordon F. Snyder is the Executive Director and Principal Investigator for the National Center for Telecommunications Technologies at Springfield Technical Community College. He has taught in the telecommunications, electronics systems, computer systems, and laser electro-optics departments at STCC since 1984, and co-chaired those departments from 1990-1999. He helped develop the Verizon Next Step program and now serves as the New England telecommunications director for the Verizon Next Step Program. In 2001, he was selected as one of the top 15 technology faculty in the United States by the American Association of Community Colleges and Microsoft Corporation. Tab Content 6Author Website:Countries AvailableAll regions |