Language:Chinese.Paperback. Pub Date: 2016-03-01 Publisher: Tsinghua University Press book focuses on issues of network and information security is facing and the technology used. The book has 10 chapters. including experimental basis (commonly used network commands. TCPUDPICMP protocol. commonly used software tools. etc.). network scanning and sniffing technology. firewall technology. Trojan technology. Web security technology. intrusion detection and honeypot technology. VPN technology . data encryption. authentication and information hiding. This book is rich in content. numerous examples. examples of targeted. description and thorough analysis. each chapter with exercises related experiments. readable. operational and practical features. This book is suitable as a computer network engineering. information security and other professional the specialist materials are also ...
"synopsis" may belong to another edition of this title.
Seller: liu xing, Nanjing, JS, China
paperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2016-03-01 Publisher: Tsinghua University Press book focuses on issues of network and information security is facing and the technology used. The book has 10 chapters. including experimental basis (commonly used network commands. TCPUDPICMP protocol. commonly used software tools. etc.). network scanning and sniffing technology. firewall technology. Trojan technology. Web security technology. intrusion detection and honeypot technology. VPN technology . da. Seller Inventory # DM019493