Building on the existing Handbook of Data Communications and Networks, and The Complete Handbook of the Internet, this book covers every aspect of computer and network security. Includes an analysis of the physical connection and data transfer over networks, the security strengths and weaknesses of network protocols, common session protocols (such as HTTP and FTP), the most popular network operating systems, network security devices, mobile networks, and an in-depth analysis of the principles and implementation of public-key encryption. The book is packed with practical security examples, advice, tips and techniques, including usable router programming commands and screen shots showing key security principles.
Jim Boyce. The Rational Guide to Small Office & Home Networking (Comprehensive and Affordable Guide)Publisher:
Reliable, shared Internet access is a must-have for many small businesses that need every advantage to compete in today's market. Home users are also relying on networks in more ways than ever, from sending e-mail to sharing documents to broadband multimedia streaming. Users may want to share a printer, lower the phone bill by switching to VoIP, and even play a networked game or two. With this book, you'll learn how to choose and configure the network that's right for you, and how to build a fast, reliable, secure network in your small office or home office (SOHO). This book takes a rational, no-nonsense approach in a compact guide - only 208 pages. The book is written to give you the basics fast! Technical accuracy is assured by Michael Heitland, Chief Systems Engineer, 702 Communications. This book comes with the following bonus materials: -Bonus Chapter: "Troubleshooting the Network" -Bonus Chapter: "Beyond the Basic Network"
As the demand for higher bandwidth has lead to the development of increasingly complex wireless technologies, an understanding of both wireless networking technologies and radio frequency (RF) principles is essential for implementing high performance and cost effective wireless networks. Wireless Networking Technology clearly explains the latest wireless technologies, covering all scales of wireless networking from personal (PAN) through local area (LAN) to metropolitan (MAN). Building on a comprehensive review of the underlying technologies, this practical guide contains how to implementation information, including a case study that looks at the specific requirements for a voice over wireless LAN application. This invaluable resource will give engineers and managers all the necessary knowledge to design, implement and operate high performance wireless networks. A· Explore in detail wireless networking technologies and understand the concepts behind RF...
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book emphasizes practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that helps you double-check the configurations you have been instructed to make. They serve as quick references for future security procedures. Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a...
Network Consultants Handbook is a resource to consultants and engineers to assess, audit, analyze, and evaluate any existing or future network environment. Resources include form templates to complete during a network audit, important device commands to aid in obtaining vital information, and additional forms to aid in documentation. Real-world case studies serve as valuable examples, and network diagramming tips help you prepare consistent drawings for in-house documentation. Network audit and evaluation guidelines aid in data gathering and analysis of network environments Real-world case studies serve as valuable and relevant examples Network diagramming tips aid consultants and engineers in preparing consistent drawings for in-house documentation