Network security first-step / by Tom Thomas and Donald Stoddard

By: Thomas, TomContributor(s): Stoddard, DonaldMaterial type: TextTextSeries: First-Step SeriesPublication details: New Delhi : Pearson Education Private Limited, 2012 cDescription: xxiv, 423 p. : ill. ; 24 cmISBN: 9788131787014 (pbk)Subject(s): Computer networks -- Security measuresDDC classification: 004.6
Contents:
Chapter 1: There be Hackers here------------------------------- Chapter 2: Security Policies------------------------------- Chapter 3: Processes and Procedures------------------------- Chapter 4: Network Security Standards and Guidelines------------------------- Chapter 5: Overview of Security Technologies---------------------------- Chapter 6: Security Protocols----------------------------- Chapter 7: Firewalls---------------------------- Chapter 8: Router Security--------------------------- Chapter 9: IPsec Virtual Private Networks (VPNs)---------------------------- Chapter 10: Wireless Security------------------------------- Chapter 11: Intrusion Detection and Honeypots---------------------------- Chapter 12: Tools of the Trade-----------------------------
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
004.6 THO-N 2012 710 (Browse shelf (Opens below)) Available 710
Total holds: 0

Chapter 1: There be Hackers here-------------------------------
Chapter 2: Security Policies-------------------------------
Chapter 3: Processes and Procedures-------------------------
Chapter 4: Network Security Standards and Guidelines-------------------------
Chapter 5: Overview of Security Technologies----------------------------
Chapter 6: Security Protocols-----------------------------
Chapter 7: Firewalls----------------------------
Chapter 8: Router Security---------------------------
Chapter 9: IPsec Virtual Private Networks (VPNs)----------------------------
Chapter 10: Wireless Security-------------------------------
Chapter 11: Intrusion Detection and Honeypots----------------------------
Chapter 12: Tools of the Trade-----------------------------

There are no comments on this title.

to post a comment.