Hebt u iets om te verkopen?

Introduction to Computer Networks and Cybersecurity

Goodwill of North Georgia
(7330)
Ingeschreven als zakelijke verkoper
US $18,33
OngeveerEUR 15,84
Objectstaat:
Nieuw
Wees gerust. Retourzendingen worden geaccepteerd.
Verzendkosten:
Gratis USPS Media MailTM.
Bevindt zich in: Norcross, Georgia, Verenigde Staten
Levering:
Geschatte levering tussen vr, 8 aug en wo, 13 aug tot 94104
De levertijd wordt geschat met onze eigen methode op basis van onder meer de nabijheid van de koper ten opzichte van de objectlocatie, de geselecteerde verzendservice, en de verzendgeschiedenis van de verkoper. De leveringstermijnen kunnen variëren, vooral gedurende piekperiodes.
Retourbeleid:
30 dagen om te retourneren. Koper betaalt voor retourzending Als u een eBay-verzendlabel gebruikt, wordt dit in mindering gebracht op het terugbetalingsbedrag.
Betalingen:
     Diners Club

Winkel met vertrouwen

Geld-terug-garantie van eBay
Ontvang het object dat u hebt besteld of krijg uw geld terug. Meer informatieGeld-terug-garantie van eBay - nieuw venster of tabblad
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:365622241320
Laatst bijgewerkt op 05 aug 2025 21:09:34 CESTAlle herzieningen bekijkenAlle herzieningen bekijken

Specificaties

Objectstaat
Nieuw: Een nieuw, ongelezen en ongebruikt boek in perfecte staat waarin geen bladzijden ontbreken of ...
Release Year
2013
Book Title
Introduction to Computer Networks and Cybersecurity
ISBN
9781466572133

Over dit product

Product Identifiers

Publisher
Taylor & Francis Group
ISBN-10
1466572132
ISBN-13
9781466572133
eBay Product ID (ePID)
117287279

Product Key Features

Number of Pages
1336 Pages
Language
English
Publication Name
Introduction to Computer Networks and Cybersecurity
Subject
Networking / General, Security / General, Security / Networking, Information Technology
Publication Year
2013
Type
Textbook
Subject Area
Computers
Author
J. David Irwin, Chwan-Hwa (John) Wu
Format
Hardcover

Dimensions

Item Height
2.2 in
Item Weight
111.5 Oz
Item Length
11.4 in
Item Width
8.7 in

Additional Product Features

Intended Audience
College Audience
LCCN
2012-036920
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
An Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. Emerging Technologies: Network and Information Infrastructure Virtualization. Unified Communications and Multimedia Protocols. Glossary of Acronyms. Index.
Synopsis
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint(R) animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? A guide to computer networks and cybersecurity, this book highlights the interconnections between the two to demystify the complexities of designing secure modern networks. The book walks users through the fundamentals of networks, from an overview of Internet architecture through the protocol layers. It then delves into cybersecurity, covering both attack and defense techniques, and closes with a look at the emerging technologies that will alter the current state of multimedia communication and data center/cloud computing.
LC Classification Number
TK5105.59

Objectbeschrijving van de verkoper

Informatie van zakelijke verkoper

Over deze verkoper

Goodwill of North Georgia

99,1% positieve feedback29K objecten verkocht

Lid geworden op feb 2019
Ingeschreven als zakelijke verkoper
At Goodwill of North Georgia, our mission is to put people to work. We ve embraced the philosophy of “a hand up, not a hand out” since 1925. Our belief is, when people go to work, it improves lives, ...
Meer weergeven

Gedetailleerde verkopersbeoordelingen

Gemiddelde van de afgelopen 12 maanden
Nauwkeurige beschrijving
5.0
Redelijke verzendkosten
5.0
Verzendtijd
5.0
Communicatie
5.0

Feedback verkoper (7.709)

Alle beoordelingen
Positief
Neutraal
Negatief