
- 432 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Network and System Security
About this book
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.- Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere- Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work- Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgements
- About the Editor
- Contributors
- Introduction
- Chapter 1. Detecting System Intrusions
- Chapter 2. Preventing System Intrusions
- Chapter 3. Guarding Against Network Intrusions
- Chapter 4. Securing Cloud Computing Systems
- Chapter 5. Unix and Linux Security
- Chapter 6. Eliminating the Security Weakness of Linux and Unix Operating Systems
- Chapter 7. Internet Security
- Chapter 8. Intranet Security
- Chapter 9. Local Area Network Security
- Chapter 10. Wireless Network Security
- Chapter 11. Cellular Network Security
- Chapter 12. RFID Security
- Chapter 13. Optical Wireless Security
- Index