Introduction to Computer Networks and Cybersecurity
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective
Chwan-Hwa "John" Wu joined the faculty of Auburn University, Alabama, in 1987, and is currently a professor of electrical and computer engineering. He has been the principal investigator on research projects funded by NSF, the U.S. Army, NASA, USDA, and many companies, including Northrop Grumman and Lockheed Martin. His current research interests include cybersecurity. He is an author and co-author of two books, 58 journal papers, and more than 130 conference publications. He also holds five U.S. patents. Dr. Wu is a Fellow of the IEEE. J. David Irwin joined Auburn University, Alabama, in 1969, and is currently the Earle C. Williams Eminent Scholar in the Electrical and Computer Engineering Department. He is the author or co-author of numerous publications, including 17 textbooks. He has held numerous positions within the IEEE, including president of both the Industrial Electronics and Education Societies, as well as editor-in-chief of the IEEE Transactions on Industrial Electronics. He is a Life Fellow of the IEEE and a Fellow of both the ASEE and the AAAS. He is the recipient of numerous education and technical awards.
An Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. |
---|---|
DOI: | 10.1201/9781466572140 |