Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
This document should be useful for security program managers, technical and functional managers, network and system administrators, and other information technology (IT) staff members. It provides them with a structured approach to network security testing. Management personnel who are responsible for systems can apply the testing procedures and tools discussed in this document to become informed about the status of the assets under their stewardship. This document can also assist in evaluating compliance with their organization’s security standards and requirements. Managers can also use this information to evaluate the technical basis and support for the decision-making processes. . | Network Security Computer Networking A Top Down Approach 5th edition. Jim Kurose Keith Ross Addison-Wesley April 2009. Chapter 8 Network Security Chapter goals understand principles of network security o cryptography and its many uses beyond confidentiality o authentication o message integrity security in practice o firewalls and intrusion detection systems o security in application transport network link layers Chapter 8 roadmap 8.1 What is network security 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections SSL 8.6 Network layer security IPsec 8.7 Securing wireless LANs 8.8 Operational security firewalls and .