Interconnections

Author: Radia Perlman
Publisher: Addison-Wesley Professional
ISBN: 0201634481
Release Date: 2000
Genre: Computers

Perlman, a bestselling author and senior consulting engineer for Sun Microsystems, provides insight for building more robust, reliable, secure and manageable networks. Coverage also includes routing and addressing strategies, VLANs, multicasting, IPv6, and more.

Entwurfsmuster

Author: Erich Gamma
Publisher: Pearson Deutschland GmbH
ISBN: 3827330432
Release Date: 2011
Genre: Agile software development


Computernetzwerke

Author: James F. Kurose
Publisher: Pearson Deutschland GmbH
ISBN: 3827373301
Release Date: 2008
Genre:


UNIX and Linux System Administration Handbook

Author: Evi Nemeth
Publisher: Pearson Education
ISBN: 9780131480056
Release Date: 2011
Genre: Computers

Surveys the best practices for all aspects of system administration, covering such topics as storage management, email, Web hosting, performance analysis, virtualization, DNS, security, and configuration management.

Troubleshooting Campus Networks

Author: Priscilla Oppenheimer
Publisher: John Wiley & Sons
ISBN: 9780471428091
Release Date: 2002-10-10
Genre: Computers

All network designers and administrators want their campus LANs torun efficiently. This book provides tips and techniques for usingprotocol analyzers and other tools to recognize problems for bothCisco and multiprotocol traffic patterns. * Focuses on troubleshooting problems that arise from the Ciscorouters inter-operating with many other network protocols * Covers both legacy and cutting-edge technologies * Authors are respected in the field for their teaching andtraining development skills in network troubleshooting

IPSec

Author: Naganand Doraswamy
Publisher:
ISBN: 3827316340
Release Date: 2000
Genre:


TCP IP F r Dummies

Author: Candace Leiden
Publisher:
ISBN: 3527701095
Release Date: 2003
Genre:

TCP/IP - das Transfer Control Protocol/Internet Protocol ist der Schlüssel zum Internet. Es regelt den Ablauf der Kommunikation von Computern und Netzwerken rund um die Welt. Candace Leiden und Marshall Wilensky entzaubern die verborgene Welt hinter dem Web und zeigen Ihnen, wie logisch die Protokolle im Internet aufgebaut sind. Lernen Sie, wie man TCP/IP installiert, es einrichtet, Fehler daraus beseitigt und sicher macht. Sie erfahren: * Wie Sie TCP/IP bei Windows, Linux und Mac konfigurieren * Welche Sorten von Netzwerken es gibt * Wie Sie mit POP uns IMAP umgehen * Was hosts files sind * Wie Sie Sicherheitsanwendungen implementieren Auf der CD: * Browser: Mozilla * Betriebssysteme: En Garde Linux * Messaging Tools: iIChat Logger CU-SeeMe * Netzwerkanwendungen: AdKiller Daemon FTP Voyager * Zusatzinformationen: CERT FAQ, Techtips, Modules and Practices" * Sicherheitsanwendungen: Entunnel (VanDyke Software, Inc.)

E Business and Distributed Systems Handbook

Author: Amjad Umar
Publisher: nge solutions, inc
ISBN: 0972741461
Release Date: 2003
Genre: Business & Economics

This module discusses the network services and architectures in the Internet World. topics include network architectures, network connectivity, IP-based networks, broadband networks, wireless networks, and Next Generation Internet.

Kryptologie

Author: Albrecht Beutelspacher
Publisher: Springer-Verlag
ISBN: 9783322858351
Release Date: 2013-03-08
Genre: Computers


Network Security

Author: Mike Speciner
Publisher: Pearson Education
ISBN: 9780132797160
Release Date: 2002-04-22
Genre: Computers

The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

Moderne Verfahren der Kryptographie

Author: Albrecht Beutelspacher
Publisher: Springer-Verlag
ISBN: 9783834823229
Release Date: 2015-08-05
Genre: Mathematics

Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten "Zero-Knowledge-Protokolle", mit denen es gelingt, einen anderen von der Existenz eines Geheimnisses zu überzeugen, ohne ihm das Geringste zu verraten.