Amazon cover image
Image from Amazon.com

Network security / Terry Pardoe, Gordon F. Snyder, Jr.

By: Contributor(s): Material type: TextTextLanguage: Eng Publisher: Clifton Park, NY : Thomson/Delmar Learning, [2005]Copyright date: ©2005Description: xxii, 485 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 1401882145
  • 9781401882143
Subject(s): LOC classification:
  • TK 5105.59 .P38 2005
Online resources:
Contents:
Ch. 1. From teleprocessing to client/server computing -- Ch. 2. Software, operating systems, and applications -- Ch. 3. Computer networks -- Ch. 4. LAN protocols -- Ch. 5. TCP/IP and the Internet -- Ch. 6. Risk analysis and threat -- Ch. 7. Access control and authentication -- Ch. 8. The technology of security -- Ch. 9. Security at the lower levels -- Ch. 10. Upper-level security services -- Ch. 11. Security services in business and government -- Ch. 12. The planning, design, and installation of secure systems -- Ch. 13. Operating a successful and secure system -- Ch. 14. The future.
Review: "This guide explores all facets of information security ranging from basic network technology to the broad applications of network security used in e-commerce, Internet security, and enterprise systems. Readers will learn about risk and threat analysis, as well as access control, authentication, encryption, and key distribution. Planning, installing, and operating a secure system is also covered. Coverage concludes with a look at future trends, including global terror and proactive solutions."--Jacket.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Shelving location Call number Copy number Status Date due Barcode
Books Books Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection TK5105.59 PAR (Browse shelf(Opens below)) 1 Available bk0007693

Includes index.

Ch. 1. From teleprocessing to client/server computing -- Ch. 2. Software, operating systems, and applications -- Ch. 3. Computer networks -- Ch. 4. LAN protocols -- Ch. 5. TCP/IP and the Internet -- Ch. 6. Risk analysis and threat -- Ch. 7. Access control and authentication -- Ch. 8. The technology of security -- Ch. 9. Security at the lower levels -- Ch. 10. Upper-level security services -- Ch. 11. Security services in business and government -- Ch. 12. The planning, design, and installation of secure systems -- Ch. 13. Operating a successful and secure system -- Ch. 14. The future.

"This guide explores all facets of information security ranging from basic network technology to the broad applications of network security used in e-commerce, Internet security, and enterprise systems. Readers will learn about risk and threat analysis, as well as access control, authentication, encryption, and key distribution. Planning, installing, and operating a secure system is also covered. Coverage concludes with a look at future trends, including global terror and proactive solutions."--Jacket.

There are no comments on this title.

to post a comment.