WE ACCEPT

 
Shopping Cart
0 items
 

NETWORK SECURITY : AN INTRODUCTION TO TECHNIQUES & STANDARD

NETWORK SECURITY : AN INTRODUCTION TO TECHNIQUES & STANDARD
Click to enlarge
Price: RM30.00
Availability: In Stock
ISBN: 978-983-2950-46-2
Penerbit: Penerbit USIM
Average Rating: Not Rated

ISBN: 978-983-2950-46-2
Year: 2007
Author:

  1. KAMARUZZAMAN SEMAN
  2. SHAHARUDIN ISMAIL
  3. WAIDAH ISMAIL

Synopsis:

The world has undergone a revolution in information and communication technology due to the increasing demands for information transmissions. The internet has been the pinnacle to the worldwide interlocking communication netwok. The users such government and private firms keep enormous amount of information needs to be protected from praying eyes. however, despite the many good things promised by the internet, it is completely vulnerable tovarious security threats suchas eavesdropping, replay, modification, theft and many others. we have read many resport on the attacks conductedby adversaries ton information kept in computers.today, computers provide a mission-critical information services for the modern corporation. the organization should be aware that the disaster comes in all shapes and sizes that will give impact to their businesses. one of the important things to protect organization from disaster is to plan for any disaster.this books attempts to provide introductory materials to students as well as individuals who are intersted to learn about network security. the discussion encompasses a broad network security. the discucion encompasses a broad scope of topics including threats, encryption, authetication, forensic, and security policies. this book explains the threats to the public computer network or to be more specific threats to the network security, describes the various encryption algorithms that have been developed by reseaschers throughout the decades. the explanation of encryption algorithms are divided into two classes: stream ciphers and block ciphers. this book also exlains how to prevent information or other acces and indentify the authority of access to the system via audit log. some cyber laws in the united states and malaysia, the british standard 7799 (bs7799), iso/iec 17799 and iso/iec 27001 are also discussed. our noble objective when we prepared this book was to offer to audience not only the theoretical concepts, but it also covers the standard of practices in network security.

Write Review
Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad            Good

Enter the code in the box below:

There are no additional images for this product.