Book description
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective
Table of contents
- To the Student
- To the Instructor
- Highlights of the Text
- Organization Supports both Hybrid and Other Well-Known Approaches
- Pedagogy
- Supplements
- Acknowledgments
-
An Introduction to Information Networks
- I.1 Introduction
- I.2 The Internet Architecture
- I.3 Access Networks
- I.4 The Network Core
- I.5 Circuit Switching vs. Packet Switching
- I.6 Packet Switching Delays and Congestion
- I.7 The Protocol Stack
- I.8 Providing the Benefits of Circuit Switching to Packet Switching
- I.9 Cybersecurity
- I.10 History of the Internet
- I.11 Concluding Remarks
- References
- Problems
-
Section 1: Applications
-
Chapter 1 - The Application Layer
- 1.1 Overview
- 1.2 Client/Server and Peer-to-Peer Architectures
- 1.3 Inter-process Communication through the Internet
- 1.4 Sockets
- 1.5 Transport Layer Services
- 1.6 The Hypertext Transfer Protocol (http)
- 1.7 Cookies: Providing States to HTTP
- 1.8 The Design of Efficient Information Delivery through Use of a Proxy
- 1.9 The File Transfer Protocol (FTP)
- 1.10 Electronic Mail
- 1.11 Concluding Remarks
- References
- Chapter 1 Problems
-
Chapter 2 - DNS and Active Directory
-
2.1 The Domain Name Service (DNS)
- 2.1.1 Overview
- 2.1.2 Recursive and Iterative Queries
- 2.1.3 Recursive or Caching DNS Server
- 2.1.4 The Resource Record (RR) and DNS Query
- 2.1.5 The DNS Protocol
- 2.1.6 The Whois Service
- 2.1.7 Server Load Balancing
- 2.1.8 A Detailed Illustration of DNS Query and Response Messaging
- 2.1.9 Reverse DNS Lookup
- 2.1.10 The Berkeley Internet Name Domain (BIND) Server
- 2.2 Active Directory (AD)
- 2.3 Concluding Remarks
- References
- Chapter 2 Problems
-
2.1 The Domain Name Service (DNS)
- Chapter 3 - XML-Based Web Services
- Chapter 4 - Socket Programming
-
Chapter 5 - Peer-to-Peer (P2P) Networks and Applications
- 5.1 P2P-vs-Client/Server
- 5.2 Types of P2P Networks
- 5.3 Pure P2P: Gnutella Networks
- 5.4 Partially Centralized Architectures
- 5.5 Hybrid Decentralized (or Centralized) P2P
- 5.6 Structured vs. Unstructured P2P
- 5.7 Skype
- 5.8 P2P Client Software
- 5.9 Peer-to-Peer Name Resolution (PNRP)
- 5.10 Apple’s Bonjour
- 5.11 Wi-Fi Direct Devices and P2P Technology
- 5.12 P2P Security
- 5.13 Internet Relay Chat (IRC)
- 5.14 Concluding Remarks
- References
- Chapter 5 Problems
-
Chapter 1 - The Application Layer
-
Section 2: Link and Physical Layers
-
Chapter 6 - The Data Link Layer and Physical Layer
-
6.1 The Physical Layer
- 6.1.1 Modems
- 6.1.2 Pulse Code Modulation (PCM) and Codec
- 6.1.3 Data Compression
- 6.1.4 Digital Transmission of Digital Data
- 6.1.5 Synchronization and Clock Recovery
- 6.1.6 Channel Multiplexing for Multiple Access
- 6.1.7 Error Control and Shannon’s Capacity Theorem
- 6.1.8 Organization for the Physical Layer Presentation
- 6.2 Link Layer Functions
- 6.3 Link Layer Realization
- 6.4 Multiple Access Protocols
- 6.5 The Link Layer Address
- 6.6 MAC Layer Frame Format
- 6.7 The 802.2 Logic Link Control (LLC) Sublayer
- 6.8 Loop Prevention and Multipathing
- 6.9 Error Detection
- 6.10 Concluding Remarks
- References
- Chapter 6 Problems
-
6.1 The Physical Layer
-
Chapter 7 - The Ethernet and Switches
- 7.1 Ethernet Overview
- 7.2 The 802.3 Medium Access Control and Physical Layers
- 7.3 The Ethernet Carrier Sense Multiple Access/Collision Detection Algorithm
- 7.4 Ethernet Hubs
- 7.5 Minimum Ethernet Frame Length
- 7.6 Ethernet Cables and Connectors
- 7.7 Gigabit Ethernet and Beyond
- 7.8 Bridges and Switches
- 7.9 A Layer 2 (L2) Switch and Layer 3 (L3) Switch/Router
- 7.10 Design Issues in Network Processors (NPs) and ASICs
- 7.11 Design Issues for the Packet Buffer/Memory and Switch Fabric
- 7.12 Cut-Through or Store-and-Forward Ethernet for Low-Latency Switching
- 7.13 Switch Management
- 7.14 Concluding Remarks
- References
- Chapter 7 Problems
-
Chapter 8 - Virtual LAN, Class of Service, and Multilayer Networks
- 8.1 The Virtual LAN (VLAN-802.11q)
- 8.2 Class of Service (CoS-802.11p)
- 8.3 Switch Design Issues in CoS, Queues and Switch Fabric
- 8.4 Asynchronous Transfer Mode (ATM)
- 8.5 Classical IP over ATM
- 8.6 Multiprotocol Label Switching (MPLS)
- 8.7 Multilayer Network (MLN) Architectures
- 8.8 Concluding Remarks
- References
- Chapter 8 Problems
-
Chapter 9 - Wireless and Mobile Networks
- 9.1 An Overview of Wireless Networks
-
9.2 802.11 Wireless LANs
- 9.2.1 The Infrastructure Mode
- 9.2.2 The Ad Hoc Mode
- 9.2.3 The Basic Service Set (BSS) and the Independent BSS (IBSS)
- 9.2.4 The Distribution System (DS) and the Extended Service Set (ESS)
- 9.2.5 Passive and Active Scanning
- 9.2.6 Robust Security Network Associations (RSNAs)
- 9.2.7 Wireless Challenges
- 9.2.8 The 802.11 Physical Layer
- 9.2.9 The 802.11n Physical Layer
-
9.2.10 The MAC Layer
- 9.2.10.1 Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
- 9.2.10.2 The Unicast Frame
- 9.2.10.3 The Distributed Coordination Function (DCF)
- 9.2.10.4 The Broadcast Frame
- 9.2.10.5 Virtual Carrier Sensing
- 9.2.10.6 The Point Coordination Function (PCF)
- 9.2.10.7 Random Back-off Time and Error Recovery
- 9.2.10.8 MAC Frames and MAC Addresses
- 9.2.10.9 MAC Frame Types
- 9.2.11 Frequency Reuse, Power and Data Rates
- 9.2.12 Power over Ethernet
- 9.3 Wireless Personal Area Network (WPAN)
- 9.4 WLANs and WPANs Comparison
- 9.5 WiMAX (802.16)
- 9.6 Cellular Networks
- 9.7 Concluding Remarks
- References
- Chapter 9 Problems
-
Chapter 6 - The Data Link Layer and Physical Layer
-
Section 3: Network Layer
-
Chapter 10 - The Network Layer
- 10.1 Network Layer Overview
- 10.2 Connection-Oriented Networks
- 10.3 Connectionless Datagram Forwarding
- 10.4 Datagram Networks vs. Virtual Circuit ATM Networks
- 10.5 Network Layer Functions in the Protocol Stack
- 10.6 The IPv4 Header
- 10.7 IP Datagram Fragmentation/Reassembly
- 10.8 Type of Service (ToS)
- 10.9 The IPv4 Address
- 10.10 The Dynamic Host Configuration Protocol (DHCP)
- 10.11 IP Multicast
- 10.12 Routing between LANs
-
10.13 Network Address Translation (NAT)
- 10.13.1 Address and Port Translation
- 10.13.2 NAPT Mapping/Binding Classifications
-
10.13.3 NAPT for Incoming Requests
- 10.13.3.1 Application Level Gateways (ALGs)
- 10.13.3.2 The Static Port Forwarding
- 10.13.3.3 The Universal Plug and Play (UPnP) Internet Gateway Device (IGD) Protocol
- 10.13.3.4 Traversal Using Relays around NAT (TURN)
- 10.13.3.5 The Session Traversal Utilities for NAT (STUN)
- 10.13.3.6 The Interactive Connectivity Establishment (ICE)
- 10.14 The Internet Control Message Protocol (ICMP)
- 10.15 The Mobile Internet Protocol
- 10.16 Concluding Remarks
- References
- Chapter 10 Problems
-
Chapter 11 - IPv6
- 11.1 The Need for IPv6
- 11.2 The IPv6 Packet Format
- 11.3 IPv6 Addresses
-
11.4 The Transition from IPv4 to IPv6
- 11.4.1 The Double NAT: NAT 444
- 11.4.2 An Incremental Carrier-Grade NAT (CGN) for IPv6 Transition
- 11.4.3 Address Family Translation
- 11.4.4 The Dual Stack
- 11.4.5 Dual-Stack Lite (DS-Lite)
- 11.4.6 Tunneling
- 11.4.7 Encapsulating an IPv6 Datagram into IPv4
- 11.4.8 The 6To4 Scheme
- 11.4.9 6To4 Automatic Tunneling
- 11.4.10 A 6To4 Relay Router
- 11.4.11 The Rapid Deployment of IPv6 on the IPv4 Infrastructures (6rd)
- 11.4.12 The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
- 11.4.13 Teredo Tunneling
- 11.5 IPv6 Configuration and Testing
- 11.6 Concluding Remarks
- References
- Chapter 11 Problems
- Chapter 12 - Routing and Interior Gateways
- Chapter 13 - Border Gateway Routing
-
Chapter 10 - The Network Layer
-
Section 4: Transport Layer
-
Chapter 14 - The Transport Layer
- 14.1 Transport Layer Overview
- 14.2 The Socket
- 14.3 The User Datagram Protocol (UDP)
- 14.4 A Reliable Transport Protocol: TCP
-
14.5 The TCP Packet Header and Options
- 14.5.1 The TCP Header Format
- 14.5.2 A 3-Way Handshake Analysis Using a Network Analyzer
- 14.5.3 The Half Close Analysis Using a Network Analyzer
- 14.5.4 Using a Network Analyzer to Obtain the Secure Shell (SSH) and HTTP Sequence and ACK Numbers
- 14.5.5 Explicit Congestion Notification
- 14.5.6 Round Trip Time Measurement
- 14.5.7 Windows Scaling
- 14.5.8 Selective Acknowledgment
- 14.5.9 The Use of a Reset Flag
- 14.5.10 The Use of a Push Flag
- 14.6 The Buffer and Sliding Window
- 14.7 Features of the Stream Control Transmission Protocol (SCTP)
- 14.8 The SCTP Packet Format
- 14.9 SCTP Association Establishment
- 14.10 The SCTP SHUTDOWN
- 14.11 SCTP Multi-Homing
- 14.12 Concluding Remarks
- References
- Chapter 14 Problems
-
Chapter 15 - Packet Loss Recovery
- 15.1 Packet Acknowledgment (ACK) and Retransmission
- 15.2 Round Trip Time and Retransmission Timeout
- 15.3 Cumulative ACK and Duplicate ACK
- 15.4 The Sliding Window and Cumulative ACK
- 15.5 Delayed ACK
- 15.6 Fast Retransmit
- 15.7 Synchronization (SYN) Packet Loss and Recovery
- 15.8 The Silly Window Syndrome/Solution
- 15.9 The TCP Selective Acknowledgment (SACK) Option
- 15.10 Concluding Remarks
- References
- Chapter 15 Problems
-
Chapter 16 - TCP Congestion Control
- 16.1 TCP Flow Control
- 16.2 TCP Congestion Control
- 16.3 Standard TCP End-to-end Congestion Control Methods
- 16.4 TCP Tahoe and TCP Reno in Request for Comment (RFC) 2001
- 16.5 An Improvement for the Reno algorithm—RFC 2581 and RFC 5681
- 16.6 TCP NewReno
- 16.7 TCP Throughput for a Real-World Download in Microsoft’s Windows XP
- 16.8 A Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm
- 16.9 High-Speed TCP (HSTCP) Congestion Control Design Issues
- 16.10 CUBIC TCP
- 16.11 Loss-Based TCP End-to-End Congestion Control Summary
- 16.12 Delay-Based Congestion Control Algorithms
- 16.13 Compound TCP (CTCP)
- 16.14 The Adaptive Receive Window Size
-
16.15 TCP Explicit Congestion Control and Its Design Issues
- 16.15.1 ECN-Capable Transport (ECT) and Congestion Experienced (CE)
- 16.15.2 The Explicit Congestion Notification (ECN) 3-Way Handshake
- 16.15.3 Congestion Experienced (CE) by Router and ECN-Echo (ECE) by Receiver
- 16.15.4 Weighted Random Early Detection (WRED) + Explicit Congestion Notification
- 16.15.5 A WRED and ECN Case Study
- 16.15.6 Performance Evaluation of Explicit Congestion Notification (ECN)
- 16.15.7 The ECN-Based Data Center TCP (DCTCP)
- 16.16 The Absence of Congestion Control in UDP and TCP Compatibility
- 16.17 Concluding Remarks
- References
- Chapter 16 Problems
-
Chapter 14 - The Transport Layer
-
Section 5: Cybersecurity
-
Chapter 17 - Cybersecurity Overview
- 17.1 Introduction
- 17.2 Security from a Global Perspective
- 17.3 Trends in the Types of Attacks and Malware
- 17.4 The Types of Malware
- 17.5 Vulnerability Naming Schemes and Security Configuration Settings
- 17.6 Obfuscation and Mutations in Malware
- 17.7 The Attacker’s Motivation and Tactics
- 17.8 Zero-Day Vulnerabilities
- 17.9 Attacks on the Power Grid and Utility Networks
- 17.10 Network and Information Infrastructure Defense Overview
- 17.11 Concluding Remarks
- References
- Chapter 17 Problems
-
Chapter 18 - Firewalls
- 18.1 Overview
- 18.2 Unified Threat Management
- 18.3 Firewalls
- 18.4 Stateless Packet Filtering
- 18.5 Stateful/Session Filtering
- 18.6 Application-Level Gateways
- 18.7 Circuit-Level Gateways
- 18.8 A Comparison of Four Types of Firewalls
- 18.9 The Architecture for a Primary-Backup Firewall
- 18.10 The Windows 7/Vista Firewall as a Personal Firewall
- 18.11 The Cisco Firewall as an Enterprise Firewall
- 18.12 The Small Office/Home Office Firewall
- 18.13 Emerging Firewall Technology
- 18.14 Concluding Remarks
- References
- Chapter 18 Problems
-
Chapter 19 - Intrusion Detection/Prevention System
- 19.1 Overview
- 19.2 The Approaches Used for IDS/IPS
- 19.3 Network-Based IDS/IPS
- 19.4 Host-Based IDS/IPS
- 19.5 Honeypots
- 19.6 The Detection of Polymorphic/Metamorphic Worms
- 19.7 Distributed Intrusion Detection Systems and Standards
- 19.8 SNORT
- 19.9 The TippingPoint IPS
- 19.10 The McAfee Approach to IPS
- 19.11 The Security Community’s Collective Approach to IDS/IPS
- 19.12 Concluding Remarks
- References
- Chapter 19 Problems
-
Chapter 20 - Hash and Authentication
- 20.1 Authentication Overview
- 20.2 Hash Functions
- 20.3 The Hash Message Authentication Code (HMAC)
- 20.4 Password-Based Authentication
- 20.5 The Password-Based Encryption Standard
- 20.6 The Automated Password Generator Standard
- 20.7 Password-Based Security Protocols
-
20.8 The One-Time Password and Token
- 20.8.1 Two-Factor Authentication
- 20.8.2 The OTP Standards
- 20.8.3 RFC 2289: A One-Time Password System
- 20.8.4 RFC 2808: The SecurID Simple Authentication and Security Layer (SASL) Mechanism
- 20.8.5 RFC 4226: The HMAC-based One Time Password (HOTP)
- 20.8.6 A Time-Based One-time Password Algorithm (TOTP)
- 20.8.7 RFC 4758: The Cryptographic Token Key Initialization Protocol (CT-KIP)
- 20.8.8 IETF Draft: One Time Password (OTP) Pre-authentication
- 20.8.9 Intel Identity Protection Technology (Intel IPT)
- 20.9 Open Identification (OpenID) and Open Authorization (OAuth)
- 20.10 Concluding Remarks
- References
- Chapter 20 Problems
-
Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security
- 21.1 Block Ciphers
- 21.2 Stream Ciphers
- 21.3 The US Government’s Cryptography Module Standards
- 21.4 Side Channel Attacks and the Defensive Mechanisms
- 21.5 Concluding Remarks
- References
- Chapter 21 Problems
-
Chapter 22 - Public Key Cryptography, Infrastructure and Certificates
- 22.1 Introduction
- 22.2 The Digital Signature Concept
- 22.3 Public Key Cryptography Characteristics
-
22.4 Elliptic Curve Cryptography (ECC)
- 22.4.1 The ECC Algorithms and Their Properties
- 22.4.2 The Elliptic Curve Discrete Logarithm Problem (ECDLP) and Its Applications
- 22.4.3 Elliptic Curve Diffie-Hellman (ECDH) Key-Agreement Protocol
- 22.4.4 Elliptic Curve Digital Signature Algorithm (ECDSA)
- 22.4.5 The Elliptic Curve Integrated Encryption Standard (ECIES)
- 22.4.6 Recommended Finite Fields and Elliptic Curves for Desired Security Strength
- 22.4.7 The ECC Challenge
- 22.5 Certificates and the Public Key Infrastructure
- 22.6 Public Key Cryptography Standards (PKCS)
- 22.7 X.509 certificate and Private Key File Formats
- 22.8 U.S. Government Standards
- 22.9 Attacks Which Target the Public Key Infrastructure and Certificates
- 22.10 Email Security
- 22.11 Concluding Remarks
- References
- Chapter 22 Problems
-
Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security
- 23.1 Introductory Overview
- 23.2 The Handshake Protocol
- 23.3 Attacks on the Handshake Protocol
- 23.4 The Record Protocol
- 23.5 SSL/TLS Cryptography
- 23.6 Datagram Transport Layer Security (DTLS)
- 23.7 US Government Recommendations
- 23.8 Extended Validation SSL (EV-SSL)
- 23.9 Establishing a Certificate Authority (CA)
- 23.10 Web Server’s Certificate Setup and Client Computer Configuration
- 23.11 A Certificate Authority’s Self-Signed Root Certificate
- 23.12 Browser Security Configurations
- 23.13 Concluding Remarks
- References
- Chapter 23 Problems
-
Chapter 24 - Virtual Private Networks for Network Layer Security
- 24.1 Network Security Overview
- 24.2 Internet Protocol Security (IPsec)
-
24.3 The Internet Key Exchange (IKE)
- 24.3.1 The IKE Components and Functions
- 24.3.2 Distributed Denial of Service (DDoS) Resistance and Cookies
- 24.3.3 IKEv2 Protocol
- 24.3.4 The Two Phases of IKE
- 24.3.5 Generating Keying Material
- 24.3.6 The Pre-Shared Secret
- 24.3.7 Extended Authentication (XAUTH)
- 24.3.8 IKE Diffie-Hellman Groups
- 24.3.9 Network Address Translation (NAT) Issues in an Authentication Header (AH) and Encapsulating Security Payloads (ESP)
- 24.4 Data Link Layer VPN Protocols
-
24.5 VPN Configuration Procedure Examples
- 24.5.1 The Use of a Pre-shared Secret for Authentication in Windows 7/Vista
- 24.5.2 Windows 7/Vista Tunnel Using PKI Certificates for Authentication
- 24.5.3 A VPN Server in Microsoft’s Internet Security and Acceleration (ISA) Server
- 24.5.4 Connecting a Windows 7/Vista to a Cisco VPN Appliance
- 24.5.5 The Cisco VPN Appliance: Certificate-Based Authentication for a Gateway to Gateway Tunnel
- 24.6 Concluding Remarks
- References
- Chapter 24 Problems
-
Chapter 25 - Network Access Control and Wireless Network Security
- 25.1 An Overview of Network Access Control (NAC)
- 25.2 Kerberos
- 25.3 The Trusted Platform Module (TPM)
- 25.4 Multiple Factor Authentications: Cryptographic Tokens and TPM
- 25.5 802.1X
- 25.6 Enterprise Wireless Network Security Protocols
- 25.7 Concluding Remarks
- References
- Chapter 25 Problems
-
Chapter 26 - Cyber Threats and Their Defense
- 26.1 Domain Name System (DNS) Protection
- 26.2 Router Security
-
26.3 Spam/Email Defensive Measures
- 26.3.1 Email Blacklists
- 26.3.2 The Sender Policy Framework (SPF)
- 26.3.3 DomainKey Identified Mail (DKIM)
- 26.3.4 Secure/Multipurpose Internet Mail Extensions (S/MIME)
- 26.3.5 Domain-Based Message Authentication, Reporting and Conformance (DMARC)
- 26.3.6 Cerificate Issues for S/MIME and Open Pretty Good Privacy (OpenPGP)
- 26.3.7 National Institute of Standards and Technology (NIST) SP 800-45 Version 2
- 26.4 Phishing Defensive Measures
-
26.5 Web-Based Attacks
- 26.5.1 Web Service Protection
- 26.5.2 Attack Kits
- 26.5.3 HTTP Response Splitting Attacks
- 26.5.4 Cross-Site Request Forgery (CSRF or XSRF)
- 26.5.5 Cross-Site Scripting (XSS) Attacks
- 26.5.6 Non-persistent XSS Attacks
- 26.5.7 Persistent XSS Attacks
- 26.5.8 Document Object Model (DOM) XSS Attacks
- 26.5.9 JavaScript Obfuscation
- 26.5.10 Asynchronous JavaScript and Extensible Markup Language (AJAX) Security
- 26.5.11 Clickjacking
- 26.6 Database Defensive Measures
- 26.7 Botnet Attacks and Applicable Defensive Techniques
- 26.8 Concluding Remarks
- References
- Chapter 26 Problems
-
Chapter 17 - Cybersecurity Overview
-
Section 6: Emerging Technologies
-
Chapter 27 - Network and Information Infrastructure Virtualization
- 27.1 Virtualization Overview
- 27.2 The Virtualization Architecture
- 27.3 Virtual Machine Monitor (VMM) Architecture Options
- 27.4 CPU Virtualization Techniques
- 27.5 Memory Virtualization
- 27.6 I/O Virtualization
- 27.7 Server Virtualization
- 27.8 Virtual Networking
- 27.9 Data Center Virtualization
- 27.10 Cloud Computing
- 27.11 Concluding Remarks
- References
- Chapter 27 Problems
-
Chapter 28 - Unified Communications and Multimedia Protocols
- 28.1 Unified Communications (UC)/Unified Messaging (UM)
- 28.2 Internet Protocol Telephony and Public Service Telephone Network Integration
- 28.3 Implementations of Unified Communications
- 28.4 The Session Initiation Protocol (SIP)
- 28.5 The SIP Distributed Architecture
- 28.6 Intelligence in Unified Communications
- 28.7 The Media in a Session Initiation Protocol Session
- 28.8 The Real-Time Protocol (RTP) and Its Packet Format
- 28.9 The Real-Time Control Protocol (RTCP) and Quality of Service (QoS)
- 28.10 Integrated Services in the Internet
- 28.11 The Real-Time Streaming Protocol (RTSP)
- 28.12 Unified Communication/Unified Messaging Security
- 28.13 Concluding Remarks
- References
- Chapter 28 Problems
-
Chapter 27 - Network and Information Infrastructure Virtualization
- Glossary of Acronyms
Product information
- Title: Introduction to Computer Networks and Cybersecurity
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781498760133
You might also like
book
CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide
An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from …
book
Networking Essentials: A CompTIA Network+ N10-007 Textbook, Fifth Edition
Thoroughly updated to reflect the CompTIA Network+ N10-007 exam, Networking Essentials, Fifth Edition is a practical, …
book
Network Security, Firewalls, and VPNs, 3rd Edition
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business …
book
Fundamentals of Information Systems Security, 3rd Edition
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third …