Image from Google Jackets

Information security

By: Language: ENG Publication details: New Delhi S. Chand 2014Edition: 1stDescription: xiv, 574p. | Binding - Paperback | 24*17 cmISBN:
  • 9789383746439
Subject(s): DDC classification:
  • DDC23 005.8 NAG
Summary: The book is organized into seventeen chapters. After providing a basic introduction to Networking, Data Communications, and TCP/IP in the first-six chapters, we have covered Internet Protocol Version 6 (IPv6) greatly improves on IPv4 by vastly increasing the number of available addresses and by enabling more efficient routing, simpler configuration, built-in IP security, better support for real-time data delivery, and other essential enhancements in Chapter 7 of Internet Protocol Version 6. It also describes transition technologies that allow you to deploy IPv6 in IPv4 intranets and across the IPv4 Internet. Chapter 8 entitled ';Network Security' describes the Computer Crime Evolution, Network Security Concepts, Network Security Design, Networking Auditing, Site Auditing, Threat Agent Assessment, Security Domain, Firewall and its Types, Demilitarized (DMZ), Risk Management, Network Threats, Preventive Measures, Security Management, etc.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Departmental Books Departmental Books School of Engineering & Technology General Stacks Circulation 005.8 NAG (Browse shelf(Opens below)) Available DE0057
Total holds: 0
Browsing Departmental Library - SOET shelves, Shelving location: General Stacks, Collection: Circulation Close shelf browser (Hides shelf browser)
005.745 THA Data warehousing 005.745 THA Data warehousing 005.8 MAR Everyday cryptography 005.8 NAG Information security 006.312 CHE Pandas for everyone 006.312 NAI Managing big data 006.6 BHA Computer graphics

The book is organized into seventeen chapters. After providing a basic introduction to Networking, Data Communications, and TCP/IP in the first-six chapters, we have covered Internet Protocol Version 6 (IPv6) greatly improves on IPv4 by vastly increasing the number of available addresses and by enabling more efficient routing, simpler configuration, built-in IP security, better support for real-time data delivery, and other essential enhancements in Chapter 7 of Internet Protocol Version 6. It also describes transition technologies that allow you to deploy IPv6 in IPv4 intranets and across the IPv4 Internet. Chapter 8 entitled ';Network Security' describes the Computer Crime Evolution, Network Security Concepts, Network Security Design, Networking Auditing, Site Auditing, Threat Agent Assessment, Security Domain, Firewall and its Types, Demilitarized (DMZ), Risk Management, Network Threats, Preventive Measures, Security Management, etc.

There are no comments on this title.

to post a comment.
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.