logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Security In Fixed And Wireless Networks An Introduction To Securing Data Communications Gunter Schaferauth

  • SKU: BELL-4311832
Security In Fixed And Wireless Networks An Introduction To Securing Data Communications Gunter Schaferauth
$ 31.00 $ 45.00 (-31%)

4.8

24 reviews

Security In Fixed And Wireless Networks An Introduction To Securing Data Communications Gunter Schaferauth instant download after payment.

Publisher: Wiley
File Extension: PDF
File size: 4 MB
Pages: 380
Author: Gunter Schafer(auth.)
ISBN: 9780470863701, 9780470863725, 0470863706, 0470863722
Language: English
Year: 2004

Product desciption

Security In Fixed And Wireless Networks An Introduction To Securing Data Communications Gunter Schaferauth by Gunter Schafer(auth.) 9780470863701, 9780470863725, 0470863706, 0470863722 instant download after payment.

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security. This book gives a firm introduction into the field covering the fundamentals of data security technology and explaining in-depth how they are applied in communication networks.

Approaches network security from the wireless as well as the computer networking side.

  • Concentrates on the core networking issues (first 4 layers up to the transport layer).
  • Helps the reader to understand the risks of a lack of security in a network & how to prevent it.
  • Brings security in networks up to date by covering wireless and mobile security issues.
  • Includes security issues around hot topics such as wireless LANs (e.g. 802.11), AAA (Authentication, authorization, and accounting), and Mobile IP.
  • Illustrates complicated security concepts with exercises and features an extensive glossary.

An essential reference tool for graduate students of computer science, electrical engineering and telecommunications who need to learn the basics of network security. Also, professionals working in data- & telecommunications will also benefit from the book as it gives a self-contained introduction to the basics of network security: network managers, engineers, IT managers.Content:
Chapter 1 Introduction (pages 1–15):
Chapter 2 Fundamentals of Cryptology (pages 17–29):
Chapter 3 Symmetric Cryptography (pages 31–52):
Chapter 4 Asymmetric Cryptography (pages 53–81):
Chapter 5 Cryptographic Check Values (pages 83–100):
Chapter 6 Random Number Generation (pages 101–110):
Chapter 7 Cryptographic Protocols (pages 111–145):
Chapter 8 Access Control (pages 147–155):
Chapter 9 Integration of Security Services into Communication Architectures (pages 157–170):
Chapter 10 Link Layer Security Protocols (pages 171–194):
Chapter 11 IPSec Security Architecture (pages 195–242):
Chapter 12 Transport Layer Security Protocols (pages 243–268):
Chapter 13 Internet Firewalls (pages 269–288):
Chapter 14 Security Aspects of Mobile Communication (pages 289–298):
Chapter 15 Security in Wireless Local Area Networks (pages 299–313):
Chapter 16 Security in Mobile Wide?Area Networks (pages 315–331):
Chapter 17 Security of Mobile Internet Communication (pages 333–355):

Related Products