Author: Gary R. McClain
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 424
Book Description
OSI is basically a set of technical standards that provide a basis for data communications, such that computers from a multitude of different manufacturers can share data, and even applications, with one another. This reference, for those who are, or expect to be, dealing with OSI issues on a daily basis, explicates the "real world" technical and business issues surrounding the implementation of the OSI model. Annotation copyrighted by Book News, Inc., Portland, OR
Open Systems Interconnection Handbook
Author: Gary R. McClain
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 424
Book Description
OSI is basically a set of technical standards that provide a basis for data communications, such that computers from a multitude of different manufacturers can share data, and even applications, with one another. This reference, for those who are, or expect to be, dealing with OSI issues on a daily basis, explicates the "real world" technical and business issues surrounding the implementation of the OSI model. Annotation copyrighted by Book News, Inc., Portland, OR
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 424
Book Description
OSI is basically a set of technical standards that provide a basis for data communications, such that computers from a multitude of different manufacturers can share data, and even applications, with one another. This reference, for those who are, or expect to be, dealing with OSI issues on a daily basis, explicates the "real world" technical and business issues surrounding the implementation of the OSI model. Annotation copyrighted by Book News, Inc., Portland, OR
Computer Security Basics
Author: Rick Lehtinen
Publisher: "O'Reilly Media, Inc."
ISBN: 1449317421
Category : Computers
Languages : en
Pages : 312
Book Description
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST
Publisher: "O'Reilly Media, Inc."
ISBN: 1449317421
Category : Computers
Languages : en
Pages : 312
Book Description
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST
Open Systems Interconnection
Author: Bijendra N. Jain
Publisher: McGraw-Hill Companies
ISBN:
Category : Computers
Languages : en
Pages : 616
Book Description
Publisher: McGraw-Hill Companies
ISBN:
Category : Computers
Languages : en
Pages : 616
Book Description
NIST Handbook
Interconnection Networks
Author: Jose Duato
Publisher: Morgan Kaufmann
ISBN: 1558608524
Category : Computers
Languages : en
Pages : 626
Book Description
Foreword -- Foreword to the First Printing -- Preface -- Chapter 1 -- Introduction -- Chapter 2 -- Message Switching Layer -- Chapter 3 -- Deadlock, Livelock, and Starvation -- Chapter 4 -- Routing Algorithms -- Chapter 5 -- CollectiveCommunicationSupport -- Chapter 6 -- Fault-Tolerant Routing -- Chapter 7 -- Network Architectures -- Chapter 8 -- Messaging Layer Software -- Chapter 9 -- Performance Evaluation -- Appendix A -- Formal Definitions for Deadlock Avoidance -- Appendix B -- Acronyms -- References -- Index.
Publisher: Morgan Kaufmann
ISBN: 1558608524
Category : Computers
Languages : en
Pages : 626
Book Description
Foreword -- Foreword to the First Printing -- Preface -- Chapter 1 -- Introduction -- Chapter 2 -- Message Switching Layer -- Chapter 3 -- Deadlock, Livelock, and Starvation -- Chapter 4 -- Routing Algorithms -- Chapter 5 -- CollectiveCommunicationSupport -- Chapter 6 -- Fault-Tolerant Routing -- Chapter 7 -- Network Architectures -- Chapter 8 -- Messaging Layer Software -- Chapter 9 -- Performance Evaluation -- Appendix A -- Formal Definitions for Deadlock Avoidance -- Appendix B -- Acronyms -- References -- Index.
Open Systems Handbook
Author: James Isaak
Publisher: Institute of Electrical & Electronics Engineers(IEEE)
ISBN:
Category : Computers
Languages : en
Pages : 216
Book Description
Publisher: Institute of Electrical & Electronics Engineers(IEEE)
ISBN:
Category : Computers
Languages : en
Pages : 216
Book Description
A Guide to the TCP/IP Protocol Suite
Author: Floyd Wilder
Publisher: Artech House Telecommunication
ISBN:
Category : Computers
Languages : en
Pages : 536
Book Description
Now you can keep up-to-date on all the major protocols of a TCP/IP-based network -- without searching through dozens of detailed RFCs. All you need is this comprehensive, technical update, which describes the most interfaces of any single source and features an introduction to binary and hexadecimal arithmetic.
Publisher: Artech House Telecommunication
ISBN:
Category : Computers
Languages : en
Pages : 536
Book Description
Now you can keep up-to-date on all the major protocols of a TCP/IP-based network -- without searching through dozens of detailed RFCs. All you need is this comprehensive, technical update, which describes the most interfaces of any single source and features an introduction to binary and hexadecimal arithmetic.
Handbook of Computer-communications Standards: The Open Systems Interconnection (OSI) model and OSI-related standards
Author: William Stallings
Publisher: Simon & Schuster Books For Young Readers
ISBN:
Category : Computers
Languages : en
Pages : 344
Book Description
Computer Systems Organization -- Computer-Communication Networks.
Publisher: Simon & Schuster Books For Young Readers
ISBN:
Category : Computers
Languages : en
Pages : 344
Book Description
Computer Systems Organization -- Computer-Communication Networks.
Computer and Information Security Handbook
Author: John R. Vacca
Publisher: Newnes
ISBN: 0123946123
Category : Computers
Languages : en
Pages : 1200
Book Description
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. - Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise - Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints - Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
Publisher: Newnes
ISBN: 0123946123
Category : Computers
Languages : en
Pages : 1200
Book Description
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. - Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise - Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints - Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
Handbook of Research on Telecommunications Planning and Management for Business
Author: Lee, In
Publisher: IGI Global
ISBN: 1605661953
Category : Technology & Engineering
Languages : en
Pages : 1211
Book Description
"This book provides original, in-depth, and innovative articles on telecommunications policy, management, and business applications"--Provided by publisher.
Publisher: IGI Global
ISBN: 1605661953
Category : Technology & Engineering
Languages : en
Pages : 1211
Book Description
"This book provides original, in-depth, and innovative articles on telecommunications policy, management, and business applications"--Provided by publisher.