Cargando…

Network security : know it all /

"Network Security: Know it All explains the basics, describes the protocols, and discusses advanced topics by the best and brightest experts in the field of network security." "Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapt...

Descripción completa

Detalles Bibliográficos
Otros Autores: Joshi, James B. D.
Formato: Libro
Lenguaje:English
Publicado: Amsterdam ; Boston : Morgan Kaufmann/Elsevier, 2008.
Materias:
Acceso en línea:http://catdir.loc.gov/catdir/toc/ecip0813/2008012262.html
http://catdir.loc.gov/catdir/enhancements/fy0838/2008012262-d.html

MARC

LEADER 00000cam a2200000Ia 4500
001 ocn213480177
003 OCoLC
005 20150815150143.0
008 140924s2008 ne a b 001 0 eng
010 |a  2008012262 
020 |a 9780123744630 
020 |a 0123744636 
035 |a (Sirsi) i9780123744630 
035 |a (OCoLC)213480177  |z (OCoLC)779901363 
040 |a DLC  |b eng  |c DLC  |d UV# 
050 4 |a TK5105.59  |b N47 2008 
082 0 0 |a 005.8  |2 22 
084 |a ST 277  |2 rvk 
245 0 0 |a Network security :  |b know it all /  |c James Joshi [y otros dieciocho]. 
260 |a Amsterdam ;  |a Boston :  |b Morgan Kaufmann/Elsevier,  |c 2008. 
300 |a xiii, 350 páginas :  |b illustrations ;  |c 25 cm. 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Incluye bibliografías 
505 0 |a Network security overview -- Network attacks -- Security and privacy architecture -- Network security algorithms -- Concepts in IP security -- IP security in practice -- Security in wireless systems -- Mobile security and privacy -- Optical network survivability -- Intrusion response systems : a survey. 
520 1 |a "Network Security: Know it All explains the basics, describes the protocols, and discusses advanced topics by the best and brightest experts in the field of network security." "Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the leading experts while creating a one-stop-shopping opportunity for readers to access the information otherwise only available from disparate sources."--Jacket. 
650 4 |a Redes de computadoras  |x Medidas de seguridad. 
700 1 |a Joshi, James B. D.  |9 411597 
856 4 1 |u http://catdir.loc.gov/catdir/toc/ecip0813/2008012262.html 
856 4 2 |u http://catdir.loc.gov/catdir/enhancements/fy0838/2008012262-d.html 
901 |a Z0  |b UV# 
942 |c LIBRO  |6 _ 
999 |c 283297  |d 283297