Design, build, and implement a secure broadband network infrastructure using this authoritative guide. Containing valuable insight from the experts at RSA Security Inc.-- the most trusted name in e-security -- this book will help you learn about common security protocols and prevent against common threats including eavesdropping and denial of service attacks.
Design, build, and implement a secure broadband network infrastructure using this authoritative guide. Containing valuable insight from the experts at RSA Security Inc.-- the most trusted name in e-security -- this book will help you learn about common security protocols and prevent against common threats including eavesdropping and denial of service attacks.
Benjamin M. Lail MCSE, CCNA, (San Mateo, CA) is a Senior Systems Engineer at RSA Security, Inc. supporting sales of BSAFE and Keon products.
Inhaltsangabe
Part I: Broadband Network Security Fundamentals 1: An Overview of Broadband Communication 2: Choosing the Right Tools: Security Services and Cryptography 3: The Need for Security: Network Threats and Countermeasures 4: Broadband Networking Technologies 5: A Survey of Existing Broadband Security Standards and Specifications Part II: Broadband Security Design Considerations 6: Existing Network Security Protocols 7: Placing Security Services and Mechanisms 8: Security Side Effects Part III: Case Studies 9: Securing Broadband Internet Access: DOCSIS BPI+ 10: Securing Real-Time Multimedia: PacketCable Security 11: Securing Interactive Television: DVB MHP Security 12: Design Scenarios Appendix A: TCP/IP Primer Appendix B: Digital Certificates and Public-Key Infrastructure
Part I: Broadband Network Security Fundamentals 1: An Overview of Broadband Communication 2: Choosing the Right Tools: Security Services and Cryptography 3: The Need for Security: Network Threats and Countermeasures 4: Broadband Networking Technologies 5: A Survey of Existing Broadband Security Standards and Specifications Part II: Broadband Security Design Considerations 6: Existing Network Security Protocols 7: Placing Security Services and Mechanisms 8: Security Side Effects Part III: Case Studies 9: Securing Broadband Internet Access: DOCSIS BPI+ 10: Securing Real-Time Multimedia: PacketCable Security 11: Securing Interactive Television: DVB MHP Security 12: Design Scenarios Appendix A: TCP/IP Primer Appendix B: Digital Certificates and Public-Key Infrastructure
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826