* Organized around common problems rather than technology or protocols, this reference shows readers all their options * Helps make the best decisions based on available budget * Explains the limitations and risks of each solution * Excellent visuals--intuitive illustrations and maps, not graphs and charts * How to implement the chosen solution
This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers.
This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors.
The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, ...
Neil holds a bachelor’s degree in computer science. This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format.
Can we really be anonymous and private online? Who controls the internet, and why is that important? And... what's with all the cats? How the Internet Really Works answers these questions and more.
In addition, it provides novel, state-of-the-art concepts and recent results. This is an ideal reference for researchers, students and professionals in industry who need to learn the applications of game theory to cognitive networking.
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the...
In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.