Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link: https://ebookbell.com/faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookBell Team
4.8
24 reviewsApproaches network security from the wireless as well as the computer networking side.
An essential reference tool for graduate students of computer science, electrical engineering and telecommunications who need to learn the basics of network security. Also, professionals working in data- & telecommunications will also benefit from the book as it gives a self-contained introduction to the basics of network security: network managers, engineers, IT managers.Content:
Chapter 1 Introduction (pages 1–15):
Chapter 2 Fundamentals of Cryptology (pages 17–29):
Chapter 3 Symmetric Cryptography (pages 31–52):
Chapter 4 Asymmetric Cryptography (pages 53–81):
Chapter 5 Cryptographic Check Values (pages 83–100):
Chapter 6 Random Number Generation (pages 101–110):
Chapter 7 Cryptographic Protocols (pages 111–145):
Chapter 8 Access Control (pages 147–155):
Chapter 9 Integration of Security Services into Communication Architectures (pages 157–170):
Chapter 10 Link Layer Security Protocols (pages 171–194):
Chapter 11 IPSec Security Architecture (pages 195–242):
Chapter 12 Transport Layer Security Protocols (pages 243–268):
Chapter 13 Internet Firewalls (pages 269–288):
Chapter 14 Security Aspects of Mobile Communication (pages 289–298):
Chapter 15 Security in Wireless Local Area Networks (pages 299–313):
Chapter 16 Security in Mobile Wide?Area Networks (pages 315–331):
Chapter 17 Security of Mobile Internet Communication (pages 333–355):