top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Ethernet networks : design, implementation, operation, management / / Gilbert Held
Ethernet networks : design, implementation, operation, management / / Gilbert Held
Autore Held Gilbert <1943->
Edizione [4th ed.]
Pubbl/distr/stampa London ; ; New York, : Wiley, 2003
Descrizione fisica 1 online resource (611 p.)
Disciplina 004.6/8
Soggetto topico Ethernet (Local area network system)
ISBN 1-280-27026-8
9786610270262
0-470-29925-8
0-470-85563-0
0-470-85564-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ethernet networks Fourth Edition; contents; Preface; Acknowledgments; Chapter 1 Introduction to Networking Concepts; 1.1 WIDE AREA NETWORKS; COMPUTER-COMMUNICATIONS EVOLUTION; REMOTE BATCH TRANSMISSION; IBM 3270 INFORMATION DISPLAY SYSTEM; NETWORK CONSTRUCTION; NETWORK CHARACTERISTICS; 1.2 LOCAL AREA NETWORKS; COMPARISON TO WANS; TECHNOLOGICAL CHARACTERISTICS; TRANSMISSION MEDIUM; ACCESS METHOD; 1.3 WHY ETHERNET; Chapter 2 Networking Standards; 2.1 STANDARDS ORGANIZATIONS; NATIONAL STANDARDS ORGANIZATIONS; INTERNATIONAL STANDARDS ORGANIZATIONS; 2.2 THE ISO REFERENCE MODEL
LAYERED ARCHITECTUREOSI LAYERS; DATA FLOW; 2.3 IEEE 802 STANDARDS; 802 COMMITTEES; DATA LINK SUBDIVISION; 2.4 INTERNET STANDARDS; RFC EVOLUTION; TYPES AND SUBMISSION; OBTAINING RFCS; 2.5 CABLING STANDARDS; EIA/TIA-568; UTP CATEGORIES; CABLE SPECIFICATIONS; OTHER METRICS; CAT 5E AND CAT 6; Chapter 3 Ethernet Networks; 3.1 ETHERNET; EVOLUTION; NETWORK COMPONENTS; THE 5-4-3 RULE; 3.2 IEEE 802.3 NETWORKS; NETWORK NAMES; 10BASE-5; 10BASE-2; 10BROAD-36; 1BASE-5; 10BASE-T; 3.3 USE OF FIBER-OPTIC TECHNOLOGY; FOIRL; OPTICAL TRANSCEIVER; FIBER HUBS; FIBER ADAPTER; WIRE AND FIBER DISTANCE LIMITS
3.4 HIGH-SPEED ETHERNETISOCHRONOUS ETHERNET; FAST ETHERNET; 100VG-ANYLAN; 3.5 GIGABIT ETHERNET; COMPONENTS; MEDIA SUPPORT; 3.6 10 GIGABIT ETHERNET; RATIONALE; ARCHITECTURE; OPERATING RATES; Chapter 4 Frame Operations; 4.1 FRAME COMPOSITION; PREAMBLE FIELD; START-OF-FRAME DELIMITER FIELD; DESTINATION ADDRESS FIELD; SOURCE ADDRESS FIELD; TYPE FIELD; LENGTH FIELD; DATA FIELD; FRAME CHECK SEQUENCE FIELD; INTERFRAME GAP; 4.2 MEDIA ACCESS CONTROL; TRANSMIT MEDIA ACCESS MANAGEMENT; SERVICE PRIMITIVES; PRIMITIVE OPERATIONS; HALF- VERSUS FULL-DUPLEX OPERATION; 4.3 LOGICAL LINK CONTROL
TYPES AND CLASSES OF SERVICESERVICE PRIMITIVES; 4.4 OTHER ETHERNET FRAME TYPES; ETHERNET-802.3; ETHERNET-SNAP; IEEE 802.1Q FRAME; FRAME DETERMINATION; 4.5 FAST ETHERNET; START-OF-STREAM DELIMITER; END-OF-STREAM DELIMITER; 4.6 GIGABIT ETHERNET; CARRIER EXTENSION; FRAME BURSTING; 4.7 10 GIGABIT ETHERNET; Chapter 5 Networking Hardware and Software; 5.1 WIRED NETWORK HARDWARE COMPONENTS; REPEATERS; BRIDGES; ROUTERS; BROUTERS; GATEWAY; FILE SERVERS; WIRE HUBS; INTELLIGENT HUBS; SWITCHING HUBS; 5.2 WIRELESS NETWORK HARDWARE COMPONENTS; NETWORK TOPOLOGIES; ACCESS POINT; WIRELESS ROUTER
WIRELESS BRIDGE5.3 NETWORKING SOFTWARE; DOS; NETWORK SOFTWARE COMPONENTS; NETWORK OPERATING SYSTEMS; APPLICATION SOFTWARE; 5.4 THE TCP/IP PROTOCOL SUITE; OVERVIEW; PROTOCOL DEVELOPMENT; THE TCP/IP STRUCTURE; DATAGRAMS VERSUS VIRTUAL CIRCUITS; ICMP; ARP; TCP; UDP; IP; DOMAIN NAME SERVICE; NAME SERVER; TCP/IP CONFIGURATION; OPERATING MULTIPLE STACKS; Chapter 6 Bridging and Switching Methods and Performance Issues; 6.1 BRIDGING METHODS; ADDRESS ISSUES; TRANSPARENT BRIDGING; SPANNING TREE PROTOCOL; PROTOCOL DEPENDENCY; SOURCE ROUTING; SOURCE ROUTING TRANSPARENT BRIDGES
6.2 BRIDGE NETWORK UTILIZATION
Record Nr. UNINA-9910142530503321
Held Gilbert <1943->  
London ; ; New York, : Wiley, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing wireless LANs [[electronic resource] ] : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held
Securing wireless LANs [[electronic resource] ] : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held
Autore Held Gilbert <1943->
Pubbl/distr/stampa Hoboken, NJ, : J. Wiley, c2003
Descrizione fisica 1 online resource (274 p.)
Disciplina 004.68
005.8
Soggetto topico Wireless LANs - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-27248-1
9786610272488
0-470-29978-9
0-470-86968-2
0-470-86969-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS
1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES
2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS
3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11
4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS
5.7.1 OVERVIEW
Record Nr. UNINA-9910143226203321
Held Gilbert <1943->  
Hoboken, NJ, : J. Wiley, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing wireless LANs [[electronic resource] ] : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held
Securing wireless LANs [[electronic resource] ] : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held
Autore Held Gilbert <1943->
Pubbl/distr/stampa Hoboken, NJ, : J. Wiley, c2003
Descrizione fisica 1 online resource (274 p.)
Disciplina 004.68
005.8
Soggetto topico Wireless LANs - Security measures
ISBN 1-280-27248-1
9786610272488
0-470-29978-9
0-470-86968-2
0-470-86969-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS
1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES
2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS
3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11
4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS
5.7.1 OVERVIEW
Record Nr. UNINA-9910830816203321
Held Gilbert <1943->  
Hoboken, NJ, : J. Wiley, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing wireless LANs : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held
Securing wireless LANs : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held
Autore Held Gilbert <1943->
Pubbl/distr/stampa Hoboken, NJ, : J. Wiley, c2003
Descrizione fisica 1 online resource (274 p.)
Disciplina 005.8
Soggetto topico Wireless LANs - Security measures
ISBN 1-280-27248-1
9786610272488
0-470-29978-9
0-470-86968-2
0-470-86969-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS
1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES
2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS
3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11
4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS
5.7.1 OVERVIEW
Record Nr. UNINA-9910877713703321
Held Gilbert <1943->  
Hoboken, NJ, : J. Wiley, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Understanding data communications : from fundamentals to networking / / Gilbert Held
Understanding data communications : from fundamentals to networking / / Gilbert Held
Autore Held Gilbert <1943->
Edizione [Third edition.]
Pubbl/distr/stampa Chichester : , : John Wiley & Sons, Ltd., , [2000]
Descrizione fisica 1 online resource (857 pages)
Disciplina 004.6
Soggetto topico Data transmission systems
Computer networks
Dades - Transmissió
Ordinadors, Xarxes d'
ISBN 9780470841488
1-280-55492-4
9786610554928
0-470-85393-X
0-470-84148-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface. -- Acknowledgements. -- Communications in a Modern Society. -- Basic Telegraph and Telephone Operations. -- Basic Circuit Parameters, Measurement Units and Media Overview. -- Fundamental Data Transmission Concepts. -- Terminals, Workstations and WAN and LAN Networking Overview. -- Representative Standards Organizations: the OSI Reference Model. -- The Physical Layer, Cables, Connectors, Plugs and Jacks. -- Basic Transmission Devices: Line Drivers, Modems, and Service Units. -- Regulators and Carriers. -- Transmission Errors: Causes, Measurements and Correction Methods. -- The WAN Data Link Layer. -- Increasing WAN Line Utilization. -- Local Area Networks. -- Basic LAN Internetworking. -- Digital Transmission Systems and Equipment. -- Network Architecture. -- Packet Networks. -- Communications Software. -- Fiber-Optic, Satellite and Wireless Terrestrial Communications. -- Evolving Technologies. -- Index.
Record Nr. UNINA-9910142490203321
Held Gilbert <1943->  
Chichester : , : John Wiley & Sons, Ltd., , [2000]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Virtual private networking [[electronic resource] ] : a construction, operation and utilization guide / / Gilbert Held
Virtual private networking [[electronic resource] ] : a construction, operation and utilization guide / / Gilbert Held
Autore Held Gilbert <1943->
Pubbl/distr/stampa Chichester, : John Wiley, c2004
Descrizione fisica 1 online resource (308 p.)
Disciplina 004.678
Soggetto topico Extranets (Computer networks)
Computer networks - Security measures
ISBN 1-280-27491-3
9786610274918
0-470-02033-4
0-470-02034-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto virtual private networking; contents; Preface; Acknowledgements; Chapter 1 Introduction to Virtual Private Networking; 1.1 THE VPN CONCEPT; 1.1.1 DEFINITION; 1.1.2 TYPES OF VPNS; 1.1.3 CATEGORIES OF VPNS; 1.1.4 INFRASTRUCTURE; 1.1.5 BENEFITS OF USE; 1.1.6 DISADVANTAGES OF VPNS; 1.1.7 VPN PROTOCOLS; 1.1.8 SUMMARY; 1.1.9 ALTERNATIVES TO VPNS; 1.1.10 ECONOMIC ISSUES; 1.1.11 OTHER ALTERNATIVES; 1.2 BOOK PREVIEW; 1.2.1 UNDERSTANDING AUTHENTICATION AND CRYPTOLOGY; 1.2.2 UNDERSTANDING THE TCP/IP PROTOCOL SUITE; 1.2.3 LAYER 2 VPN TECHNIQUES; 1.2.4 HIGHER LAYER VPNS; 1.2.5 VPN HARDWARE AND SOFTWARE
1.2.6 SERVICE PROVIDER-BASED VPNSChapter 2 Understanding Authentication and Encryption; 2.1 AUTHENTICATION; 2.1.1 PASSWORD AUTHENTICATION PROTOCOL; 2.1.2 CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL; 2.1.3 EXTENSIBLE AUTHENTICATION PROTOCOL - TRANSPORT LEVEL SECURITY; 2.1.4 TOKEN AUTHENTICATION; 2.2 ENCRYPTION; 2.2.1 GENERAL METHOD OF OPERATION; 2.2.2 PRIVATE VERSUS PUBLIC KEY SYSTEMS; 2.2.3 PUBLIC KEY ENCRYPTION; 2.2.4 THE RSA ALGORITHM; 2.2.5 DIGITAL CERTIFICATES; 2.2.6 HASHING AND DIGITAL SIGNATURES; Chapter 3 Understanding the TCP/IP Protocol Suite; 3.1 FRAME FORMATION
3.1.1 HEADER SEQUENCING3.1.2 SEGMENTS AND DATAGRAMS; 3.1.3 ICMP MESSAGES; 3.1.4 ON THE LAN; 3.1.5 DATAFLOW CONTROL FIELDS; 3.2 THE NETWORK LAYER; 3.2.1 THE IPV4 HEADER; 3.2.2 SUBNETTING; 3.2.3 THE SUBNET MASK; 3.2.4 THE WILDCARD MASK; 3.2.5 ICMP; 3.3 THE TRANSPORT LAYER; 3.3.1 TRANSPORT LAYER PROTOCOLS; 3.3.2 THE TCP HEADER; 3.3.3 THE UDP HEADER; 3.3.4 SOURCE AND DESTINATION PORT FIELDS; 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION; 3.4.1 PROXY SERVICE; 3.4.2 NETWORK ADDRESS TRANSLATION; 3.4.3 TYPES OF ADDRESS TRANSLATION; 3.4.4 VPN CONSIDERATIONS; Chapter 4 Layer 2 Operations
4.1 THE POINT-TO-POINT PROTOCOL4.1.1 COMPONENTS; 4.1.2 PPP ENCAPSULATION; 4.1.3 LINK CONTROL PROTOCOL OPERATIONS; 4.1.4 MULTILINK PPP; 4.2 POINT-TO-POINT TUNNELING PROTOCOL; 4.2.1 IMPLEMENTATION MODELS; 4.2.2 NETWORKING FUNCTIONS; 4.2.3 ESTABLISHING THE PPTP TUNNEL; 4.2.4 PPTP ENCAPSULATED PACKETS; 4.2.5 THE PPTP CONTROL CONNECTION PACKET; 4.2.6 CONTROL CONNECTION PROTOCOL OPERATION; 4.2.7 PPTP DATA TUNNELING; 4.3 LAYER TWO FORWARDING; 4.3.1 EVOLUTION; 4.3.2 OPERATION; 4.3.3 THE L2F PACKET FORMAT; 4.3.4 TUNNEL OPERATIONS; 4.3.5 MANAGEMENT MESSAGES; 4.4 LAYER TWO TUNNELING PROTOCOL
4.4.1 OVERVIEW4.4.2 ARCHITECTURAL MODELS; 4.4.3 THE L2TP PACKET FORMAT; 4.4.4 CONTROL MESSAGES; 4.4.5 PROTOCOL OPERATIONS; Chapter 5 Higher Layer VPNs; 5.1 UNDERSTANDING IPSEC; 5.1.1 OVERVIEW; 5.1.2 TOPOLOGIES SUPPORTED; 5.1.3 SPECIFYING SESSION PARAMETERS; 5.1.4 THE SPI; 5.1.5 PROTOCOLS; 5.1.6 AUTHENTICATION HEADER; 5.1.7 ENCAPSULATING SECURITY PAYLOAD; 5.1.8 OPERATIONS; 5.1.9 KEY MANAGEMENT; 5.2 WORKING WITH IPSEC; 5.2.1 CONFIGURING IPSEC POLICIES; 5.2.2 ADDING THE IPSEC SNAP-IN; 5.2.3 CREATING AN IPSEC POLICY; 5.2.4 WORKING WITH IPSEC FILTERS; 5.3 SSL AND TLS; 5.3.1 RATIONALE FOR SSL
5.3.2 OVERVIEW OF SSL
Record Nr. UNINA-9910145753003321
Held Gilbert <1943->  
Chichester, : John Wiley, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Virtual private networking : a construction, operation and utilization guide / / Gilbert Held
Virtual private networking : a construction, operation and utilization guide / / Gilbert Held
Autore Held Gilbert <1943->
Edizione [1st ed.]
Pubbl/distr/stampa Chichester, : John Wiley, c2004
Descrizione fisica 1 online resource (308 p.)
Disciplina 004.678
Soggetto topico Extranets (Computer networks)
Computer networks - Security measures
ISBN 1-280-27491-3
9786610274918
0-470-02033-4
0-470-02034-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto virtual private networking; contents; Preface; Acknowledgements; Chapter 1 Introduction to Virtual Private Networking; 1.1 THE VPN CONCEPT; 1.1.1 DEFINITION; 1.1.2 TYPES OF VPNS; 1.1.3 CATEGORIES OF VPNS; 1.1.4 INFRASTRUCTURE; 1.1.5 BENEFITS OF USE; 1.1.6 DISADVANTAGES OF VPNS; 1.1.7 VPN PROTOCOLS; 1.1.8 SUMMARY; 1.1.9 ALTERNATIVES TO VPNS; 1.1.10 ECONOMIC ISSUES; 1.1.11 OTHER ALTERNATIVES; 1.2 BOOK PREVIEW; 1.2.1 UNDERSTANDING AUTHENTICATION AND CRYPTOLOGY; 1.2.2 UNDERSTANDING THE TCP/IP PROTOCOL SUITE; 1.2.3 LAYER 2 VPN TECHNIQUES; 1.2.4 HIGHER LAYER VPNS; 1.2.5 VPN HARDWARE AND SOFTWARE
1.2.6 SERVICE PROVIDER-BASED VPNSChapter 2 Understanding Authentication and Encryption; 2.1 AUTHENTICATION; 2.1.1 PASSWORD AUTHENTICATION PROTOCOL; 2.1.2 CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL; 2.1.3 EXTENSIBLE AUTHENTICATION PROTOCOL - TRANSPORT LEVEL SECURITY; 2.1.4 TOKEN AUTHENTICATION; 2.2 ENCRYPTION; 2.2.1 GENERAL METHOD OF OPERATION; 2.2.2 PRIVATE VERSUS PUBLIC KEY SYSTEMS; 2.2.3 PUBLIC KEY ENCRYPTION; 2.2.4 THE RSA ALGORITHM; 2.2.5 DIGITAL CERTIFICATES; 2.2.6 HASHING AND DIGITAL SIGNATURES; Chapter 3 Understanding the TCP/IP Protocol Suite; 3.1 FRAME FORMATION
3.1.1 HEADER SEQUENCING3.1.2 SEGMENTS AND DATAGRAMS; 3.1.3 ICMP MESSAGES; 3.1.4 ON THE LAN; 3.1.5 DATAFLOW CONTROL FIELDS; 3.2 THE NETWORK LAYER; 3.2.1 THE IPV4 HEADER; 3.2.2 SUBNETTING; 3.2.3 THE SUBNET MASK; 3.2.4 THE WILDCARD MASK; 3.2.5 ICMP; 3.3 THE TRANSPORT LAYER; 3.3.1 TRANSPORT LAYER PROTOCOLS; 3.3.2 THE TCP HEADER; 3.3.3 THE UDP HEADER; 3.3.4 SOURCE AND DESTINATION PORT FIELDS; 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION; 3.4.1 PROXY SERVICE; 3.4.2 NETWORK ADDRESS TRANSLATION; 3.4.3 TYPES OF ADDRESS TRANSLATION; 3.4.4 VPN CONSIDERATIONS; Chapter 4 Layer 2 Operations
4.1 THE POINT-TO-POINT PROTOCOL4.1.1 COMPONENTS; 4.1.2 PPP ENCAPSULATION; 4.1.3 LINK CONTROL PROTOCOL OPERATIONS; 4.1.4 MULTILINK PPP; 4.2 POINT-TO-POINT TUNNELING PROTOCOL; 4.2.1 IMPLEMENTATION MODELS; 4.2.2 NETWORKING FUNCTIONS; 4.2.3 ESTABLISHING THE PPTP TUNNEL; 4.2.4 PPTP ENCAPSULATED PACKETS; 4.2.5 THE PPTP CONTROL CONNECTION PACKET; 4.2.6 CONTROL CONNECTION PROTOCOL OPERATION; 4.2.7 PPTP DATA TUNNELING; 4.3 LAYER TWO FORWARDING; 4.3.1 EVOLUTION; 4.3.2 OPERATION; 4.3.3 THE L2F PACKET FORMAT; 4.3.4 TUNNEL OPERATIONS; 4.3.5 MANAGEMENT MESSAGES; 4.4 LAYER TWO TUNNELING PROTOCOL
4.4.1 OVERVIEW4.4.2 ARCHITECTURAL MODELS; 4.4.3 THE L2TP PACKET FORMAT; 4.4.4 CONTROL MESSAGES; 4.4.5 PROTOCOL OPERATIONS; Chapter 5 Higher Layer VPNs; 5.1 UNDERSTANDING IPSEC; 5.1.1 OVERVIEW; 5.1.2 TOPOLOGIES SUPPORTED; 5.1.3 SPECIFYING SESSION PARAMETERS; 5.1.4 THE SPI; 5.1.5 PROTOCOLS; 5.1.6 AUTHENTICATION HEADER; 5.1.7 ENCAPSULATING SECURITY PAYLOAD; 5.1.8 OPERATIONS; 5.1.9 KEY MANAGEMENT; 5.2 WORKING WITH IPSEC; 5.2.1 CONFIGURING IPSEC POLICIES; 5.2.2 ADDING THE IPSEC SNAP-IN; 5.2.3 CREATING AN IPSEC POLICY; 5.2.4 WORKING WITH IPSEC FILTERS; 5.3 SSL AND TLS; 5.3.1 RATIONALE FOR SSL
5.3.2 OVERVIEW OF SSL
Record Nr. UNINA-9910813377403321
Held Gilbert <1943->  
Chichester, : John Wiley, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui