General

Authors

Search


Committee login



 
 

 


 

 

Forthcoming

Small thumbnail

Nonlinear Theory of Elastic Plates

Small thumbnail

Exterior Algebras

Elementary Tribute to Grassmann's Ideas

Small thumbnail

From Pinch Methodology to Pinch-Exergy Integration of Flexible Systems

Thermodynamics Energy, Environment, Economy Set

Small thumbnail

Data Treatment in Environmental Sciences

Multivaried Approach

Small thumbnail

Gas Hydrates 1

Fundamentals, Characterization and Modeling

Small thumbnail

Smart Decisions in Complex Systems

Small thumbnail

Chi-squared Goodness-of-fit Tests for Censored Data

Stochastic Models in Survival Analysis and Reliability Set Volume 3

Small thumbnail

Baidu SEO

Challenges and Intricacies of Marketing in China

Small thumbnail

Supply Chain Management and Business Performance

The VASC Model

Small thumbnail

Asymmetric Alliances and Information Systems

Issues and Prospects

Small thumbnail

Network Security

André Perez, Consultant

ISBN: 9781848217584

Publication Date: September 2014   Hardback   308 pp.

140.00 USD


Add to cart

eBooks


Ebook Ebook

Description

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.
The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Contents

1. Introduction to Cryptography.
2. 802.1X Mechanism.
3. WPA Mechanisms.
4. IPSec Mechanism.
5. SSL, TLS and DTLS Protocols.
6. Network Management.
7. MPLS Technology.
8. Ethernet VPN.
9. Firewalls.
10. Intrusion Detection.

About the Authors

André Perez is a consultant and teacher in networks and telecommunications. He works with industrialists and operators regarding architecture studies and leads training on the 4G and IMS networks for NEXCOM SYSTEMS.

Downloads

DownloadTable of Contents - PDF File - 119 Kb

Related Titles



































0.02077 s.