• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Business data networks and security /

پدید آورنده
Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.

موضوع
Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz

رده
HD30
.
37
.
P36
2019

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0134817125
(Number (ISBN
9780134817125

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Business data networks and security /
General Material Designation
[Book]
First Statement of Responsibility
Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.

EDITION STATEMENT

Edition Statement
Eleventh edition.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
NY, NY :
Name of Publisher, Distributor, etc.
Pearson,
Date of Publication, Distribution, etc.
[2019]

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xli, 469 pages ;
Dimensions
24 cm

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Machine generated contents note: A State of Siege -- Anything, Anytime, Anywhere -- The Internet Reorganizes to Get Commercial -- Old Yet Always New -- Owning and Managing the Internet -- The Snake in the Garden -- Next Steps -- Outside the Internet -- Client and Server Hosts -- Networked Applications -- The Job of the Source Host -- The Job of the Destination Host -- Inside the Internet -- The Main Characters: IP Addresses, Packets, Routers, Data Links, and Routes -- IP Addresses -- IP Packets -- Routers -- Data Links and Routes -- The Transport and Internet Processes in the Network Stack -- Supervisory Standards: Beyond TCP and IP -- Single Networks, Data Links, and Physical Links -- Point-to-Point Single Networks -- Ethernet Single Networks -- Frames and Packets -- Single Network Addresses -- Internet Routers and Personal Access Routers -- Internet Core Routers -- Residential Access Router -- Corporate Access Point -- Where to Next? -- End-of-Chapter Questions.
Text of Note
Note continued: Adding Connectors -- Cutting the Cord -- Stripping the Cord -- Working with the Exposed Pairs -- Pair Colors -- Untwisting the Pairs -- Ordering the Pairs -- Cutting the Wires -- Adding the Connector -- Holding the Connector -- Sliding in the Wires -- Some Jacket Inside the Connector -- Crimping -- Pressing Down -- Making Electrical Contact -- Strain Relief -- Testing -- Testing with Continuity Testers -- Testing for Signal Quality -- Introduction -- OSI Standards -- 802.11 = Wi-Fi -- Basic Access Point Operation -- Radio Signal Propagation -- Perfidious Radio -- Frequencies -- Antennas -- Wireless Propagation Problems -- Service Bands and Bandwidth -- Service Bands -- Signal and Channel Bandwidth -- Licensed and Unlicensed Service Bands -- Channel Use and Co-Channel Interference -- The 2.4 GHz and 5 GHz Unlicensed Service Bands -- Spread Spectrum Transmission -- Normal versus Spread Spectrum Transmission.
Text of Note
Note continued: Basic Physical Layer Terminology -- Ethernet Physical Layer Standards -- Signaling -- 4-Pair Unshielded Twisted Pair (UTP) Physical Links -- Optical Fiber (Fiber) -- Link Aggregation (Bonding) -- Perspective on Purchasing Physical Links in Ethernet -- In More Depth: Fiber Modes and Light Wavelength -- The Ethernet Data Link Layer Switching and Frame Syntax Standard -- Physical Link and Data Link Length Restrictions -- Ethernet Data Link Layer Switch Operation -- Core Fields in the Ethernet Frame -- In More Depth: Secondary Fields in The Ethernet Frame -- Management -- SNMP -- Reliability -- Ethernet Security -- Ethernet Security in Perspective -- Virtual LANs (VLANs) for Network Segregation -- Initial User Authentication Through 802.1X -- 802.1AE Switch-to-Switch Protection -- ARP Cache Poisoning -- End-of-Chapter Questions -- Introduction -- Solid and Stranded Wiring -- Solid-Wire UTP versus Stranded-Wire UTP -- Relative Advantages.
Text of Note
Note continued: Beyond 802.11i Security -- Rogue Access Points -- Evil Twin Access Points and Virtual Private Networks (VPNs) -- 802.11 Wi-Fi Wireless LAN Management -- Access Point Placement -- Centralized Management -- In More Depth: Expressing Power Ratios in Decibels -- Peer-to-Peer Protocols for the Internet of Things (IoT) -- Bluetooth -- Classic Bluetooth and Bluetooth Low Energy (LE) -- One-to-One, Master-Slave Operation -- Bluetooth Profiles -- Bluetooth Low Energy -- Other Promising loT Transmission Standards -- Near Field Communication (NFC) -- Wi-Fi Direct -- Zigbee and Z-Wave -- Security in the Internet of Things -- End of Chapter Questions -- Introduction -- IP Routing -- Hierarchical IPv4 Addressing -- Routers, Networks, and Subnets -- Network and Subnet Masks -- How Routers Process Packets -- Switching versus Routing -- Routing Table -- Rows Are Routes for All IPv4 Addresses in a Range -- Step 1: Finding All Row Matches.
Text of Note
Note continued: Cellular Generations: 3G, 4G, and 5G -- Wired Business WANs -- Leased Lines -- Reaching the ISP via a Leased Line -- Leased Line Private Corporate WANs -- Carrier WAN Services -- Carrier Ethernet -- Multiprotocol Label Switching (MPLS) -- WAN Optimization -- End-of-Chapter Questions -- Introduction -- Networked Applications and Application Architectures -- Application Security -- Netflix Dives into the Amazon -- Netflix -- Virtualization and Agility -- Infrastructure as a Service (IaaS) and Software as a Service (SaaS) -- Clients Move into the Cloud -- Rain Clouds: Security -- Networks and The Cloud -- The World Wide Web -- HTTP and HTML Standards -- Complex Webpages -- The Hypertext Transfer Protocol (HTTP) -- Electronic Mail (E-Mail) -- Delivery Standards -- Receiving Standards -- E-Mail File Format Standards -- Cryptographic E-Mail Protections -- Voice Over IP (VoIP) -- CODEC -- External Components -- VoIP Signaling -- The VoIP Transport Packet.
Text of Note
Note continued: Converting Integers into Binary Numbers (1s and Os) -- Encoding Alternatives -- Protocols in this Chapter -- End-of-Chapter Questions -- Introduction -- Network Quality of Service (QoS) -- Transmission Speed -- Other Quality-of-Service Metrics -- Service Level Agreements (SLAs) -- Network Design -- Traffic Analysis -- Reliability Through Redundancy -- Traffic Requirements versus Leased Lines -- Momentary Traffic Peaks -- Centralized Network Management -- Ping -- Traceroute -- The Simple Network Management Protocol (SNMP) -- Automation -- Software-Defined Networking (SDN) -- Traditional Configuration and Its Discontents -- Software-Defined Networking Operation -- End-of-Chapter Questions -- What is Visio? -- Using Visio -- The Target Breach -- The POS Attack -- Damages -- Perspective -- Introduction -- Types of Attacks -- Malware Attacks -- Vulnerabilities and Patches -- Social Engineering: No Vulnerability Necessary -- Types of Malware -- Payloads.
Text of Note
Note continued: How Internet Standards Come to Be -- In More Depth: April 1 and RFCs -- Introduction -- Standard = Protocol -- What Are Network Standards? -- The Importance of Standards -- Creating Standards -- Standards Agencies -- Standards Architectures -- The O51 Standards Architecture -- The TCP/IP Standards Architecture -- When Do We Capitalize "Internet?" -- The Hybrid TCP/IP-OSI Standards Architecture -- Message Ordering (Plus Reliability and Connection Orientation) in Standards -- Simple Message Ordering in HTTP -- Message Ordering and Reliability in TCP at the Transport Layer -- Message Syntax in Standards -- Syntax: General Message Organization -- The Syntax of the Internet Protocol (IP) Packet -- Transmission Control Protocol (TCP) Segment Syntax -- User Datagram Protocol (UDP) Datagram Syntax -- Port Numbers -- Frame Syntax -- Encoding Application Messages into Binary -- Encoding -- Encoding Text as ASCII.
Text of Note
Note continued: Human Break-Ins (Hacking) -- Denial-of-Service (DoS) Attacks -- Advanced Persistent Threats (APTs) -- Types of Attackers -- Cybercriminals -- Employees, Ex-Employees, and Other Insiders -- Business Competitors -- Cyberterrorists and National Governments -- Protecting Dialogues Cryptographically -- Encryption for Confidentiality -- Electronic Signatures: Message Authentication and Integrity -- Host-to-Host Virtual Private Networks (VPNs) -- Authentication -- Authentication Terminology and Concepts -- Reusable Passwords -- Other Forms of Authentication -- Firewalls and Intrusion Detection Systems -- Dropping and Logging Provable Attack Packets -- Stateful Packet Inspection (SPI) Firewalls -- Next-Generation (Application Aware) Firewalls (NGFWs) -- Intrusion Detection System (IDSs) -- In More Depth: Antivirus Protection -- End-of-Chapter Questions -- Ethernet Begins -- Introduction -- Local Area Networks -- Perspective: Layer 1 and Layer 2 Standards.
Text of Note
Note continued: Orthogonal Frequency Division Multiplexing (OFDM) Spread Spectrum Transmission -- 802.11 WLAN Operation -- From 802.11 to 802.3 -- Wireless Networks with Multiple Access Points -- Media Access Control -- In More Depth: Media Access Control (Mac) -- 802.11 Transmission Standards -- Channel Bandwidth and Service Band Bandwidth -- Speed and Market Status -- Your Service Speed Will Vary. A Lot. -- Multiple Input/Multiple Output (MIMO) -- Beamforming and Multiuser MIMO -- In More Depth: 802.11/WI-Fl Notes -- End-of-Chapter Questions -- Introduction -- The Four Windows -- The Radar Window (Read the Fine Print) -- Connection Window -- The Networks Window -- Signal History -- Other Groups on the Ribbon -- Tests -- Connection Test -- Speed Test -- Quality Test -- Child's Play -- 802.11i WLAN Security -- 802.11i -- 802.11i Stages -- Pre-Shared Key (PSK) Initial Authentication Mode in 802.11i -- 802.1X Initial Authentication Mode Operation.
Text of Note
Note continued: Other TCP/IP Standards -- Network Address Translation (NAT) -- The Domain Name System (DNS) -- DHCP Servers -- Simple Network Management Protocol (SNMP) -- Dynamic Routing Protocols -- Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer -- IPsec -- Core IPsec Principles -- VPNs -- Applying ESP Protections -- Security Associations (SAs) -- Creating Security Associations -- SSL/TLS VPNs -- End-of-Chapter Questions -- Command Line Interfaces (CLIs) -- CLI Essentials -- A More Complex Cisco IOS Interaction -- LANs and WANs (and MANs) -- LANs versus MANs and WANs -- Other Aspects of WANs -- Carrier WAN Components and Business Uses -- The Telephone System -- Residential Wired Internet Access -- Residential Asymmetric Digital Subscriber Line (ADSL) Service -- Cable Modem Service -- ADSL versus Cable Modem Service -- Cellular Data Service -- Cellular Service -- Why Cells? -- Cellular Data Speeds.
Text of Note
Note continued: Peer-to-Peer (P2P) Applications -- Skype -- Tor -- End-of-Chapter Questions -- Failures in the Target Breach -- The Plan-Protect-Respond Cycle -- Security Planning Principles -- Risk Analysis -- Comprehensive Security -- Defense in Depth and Weakest Links -- Identify and Manage Single Points of Takeover -- Least Permissions -- Identity Management -- Segment the Network -- Organizational System Security -- Policy-Based Security Management -- Policies versus Implementation -- Oversight -- Implementation Guidance -- Policy-Based Centralized Management -- Response -- Normal Incidents -- Major Incidents -- Rehearsing for Major Incidents -- Real-Time Fail-Over -- Intrusion Detection Systems (IDSs) -- End-of-Chapter Questions.
Text of Note
Note continued: Step 2: Selecting the Best-Match Row -- Step 3: Sending the Packet Back Out -- Cheating (Decision Caching) -- Routing Tables for IPv6 Addresses -- In More Depth: Masking When Masks Do Not Break at 8-Bit Boundaries -- The Internet Protocol Version 4 (IPv4) Fields -- The First Row -- The Second Row -- The Third Row -- IP Options -- IP Version 6 (IPv6) -- Outgrowing IPv4 -- IPv6 -- Writing IPv6 Addresses in Canonical Text Notation (RFC 5952) -- The IPv6 Main Header -- Extension Headers -- The Transmission Control Protocol (TCP) -- Fields in TCP/IP Segments -- Openings and Abrupt TCP Closes -- The Limited Maximum Length of User Datagram Protocol (UDP) Datagrams -- End-of-Chapter Questions -- Introduction -- Getting Wireshark -- Using Wireshark -- Getting Started -- Starting a Packet Capture -- Getting Data -- Stopping Data Collection -- Looking at Individual Packets -- Options -- Introduction -- IP Subnetting -- IPv4 Subnet Planning -- IPv6 Subnetting.
0
0
0
0
0
0
0
0
0
0
0
0

TOPICAL NAME USED AS SUBJECT

Business enterprises-- Computer networks-- Security measures.
Computer networks-- Management.
Computer networks-- Security measures.
Computer security.
Business enterprises-- Computer networks-- Security measures.
Computer networks-- Management.
Computer networks-- Security measures.
Computer security.
Computersicherheit
Datensicherung
Rechnernetz

DEWEY DECIMAL CLASSIFICATION

Number
658
.
4/78
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
HD30
.
37
Book number
.
P36
2019

PERSONAL NAME - PRIMARY RESPONSIBILITY

Panko, Raymond R.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Panko, Julia L.

ORIGINATING SOURCE

Date of Transaction
20200822085933.0
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival