Notifications can be turned off anytime from settings.
Item(s) Added To cart
Qty.
Something went wrong. Please refresh the page and try again.
Something went wrong. Please refresh the page and try again.
Exchange offer not applicable. New product price is lower than exchange product price
Please check the updated No Cost EMI details on the payment page
Exchange offer is not applicable with this product
Exchange Offer cannot be clubbed with Bajaj Finserv for this product
Product price & seller has been updated as per Bajaj Finserv EMI option
Please apply exchange offer again
Your item has been added to Shortlist.
View AllYour Item has been added to Shopping List
View All
No Cost EMI of Zero Emi Vendor applied on the product
You selected EMI of for monthsChangeGenerally delivered in 5 - 9 days
Item is available at . Change
You will be notified when this product will be in stock
|
Network Securities Essentials: Applications and Standards introduces students to the critical importance of Internet security in our age of universal electronic connectivity. Amidst viruses,
hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks. The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving students a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed Internet standards.
Features
1. Chapter on network access control includes a general overview of the topic plus discussions of the
Extensive Authentication Protocol and IEEE 802.1X
2. Section on cloud security covers the security issues related to cloud computing
3. Section on mobile device security introduces this essential aspect of enterprise network security
4. Thoroughly updated chapter on malicious software focusing on backdoor/rootkit malware more
commonly installed by social engineering attacks, rather than more classic direct infections like
viruses and worms
Contents:
1. Introduction
2. Symmetric Encryption and Message
3. Public-Key Cryptography and Message
4. Key Distribution and User Authentication
5. Network Access Control and Cloud Security
6. Transport-Level Security
7. Wireless Network Security
8. Electronic Mail Security
9. IP Security
10. Malicious Software
11. Intruders
12. Firewalls
The images represent actual product though color of the image and product may slightly differ.
Register now to get updates on promotions and
coupons. Or Download App