Introduction to Network Security
Jacobson, Douglas
From ThriftBooks-Dallas, Dallas, TX, U.S.A.
Seller rating 5 out of 5 stars
AbeBooks Seller since 2 July 2009
Used - Hardcover
Quantity: 1 available
Add to basketFrom ThriftBooks-Dallas, Dallas, TX, U.S.A.
Seller rating 5 out of 5 stars
AbeBooks Seller since 2 July 2009
Quantity: 1 available
Add to basketAbout this Item
Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.9. Seller Inventory # G1584885432I2N00
Bibliographic Details
Title: Introduction to Network Security
Publisher: CRC Press
Publication Date: 2008
Binding: Hardcover
Condition: As New
Dust Jacket Condition: No Jacket
About this title
Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.
The book begins with a brief discussion of network architectures and the functions of layers in a typical network. It then examines vulnerabilities and attacks divided into four categories: header-, protocol-, authentication-, and traffic-based. The author next explores the physical, network, and transport layers of each network as well as the security of several common network applications. The last section recommends several network-based security solutions that can be successfully deployed.
This book uses a define-attack-defend methodology for network security. The author briefly introduces the relevant protocols and follows up with detailed descriptions of known vulnerabilities and possible attack methods. He delineates the threats against the protocol and presents possible solutions. Sample problems and lab experiments based on the concepts allow readers to experiment with attacks and assess the effectiveness of solutions. Two appendices provide further clarification and a companion website is offered which supplements the material.
While most of the books available on this subject focus solely on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions. By focusing on a practical view of network security and examining actual protocols, readers can better understand the vulnerabilities and develop appropriate countermeasures.
... Students can easily understand how things work thanks to the different figures/definitions ... students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. ... A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. ... the book is really well written, and easily understandable without lacking the rigor required in the domain. ...This book won’t get dusty on my shelf, as it contains so [much] precious information, and is enjoyable.
―IACR book reviews, February 2010
"About this title" may belong to another edition of this title.
Store Description
We guarantee each book that we send you. If you have any problems, please contact
our dedicated customer service department. They will do everything possible to
ensure you are happy with your order.
All domestic Standard and Expedited shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – we do not use courier services for international deliveries.
Payment Methods
accepted by seller