top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Business data communications : infrastructure, networking and security / / William Stallings, Thomas Case
Business data communications : infrastructure, networking and security / / William Stallings, Thomas Case
Autore Stallings William
Edizione [Seventh, international edition.]
Pubbl/distr/stampa Boston : , : Pearson, , [2013]
Descrizione fisica 1 online resource
Disciplina 658.054
Collana Always learning
Soggetto topico Business - Data processing
ISBN 0-273-77530-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Contents -- Online Resources -- Preface -- About the Authors -- Chapter 0 Reader's and Instructor's Guide -- 0.1 Outline of This Book -- 0.2 Topic Ordering -- 0.3 Internet and Web Resources -- 0.4 Useful Publications -- Chapter 1 Introduction -- 1.1 Information and Communication -- 1.2 Data Communications and Networking for Today's Enterprise -- 1.3 Convergence and Unified Communications -- 1.4 The Nature of Business Information Requirements -- 1.5 The Transmission of Information -- 1.6 Distributed Data Processing -- 1.7 The Internet and Distributed Applications -- 1.8 Networks -- 1.9 Management Issues -- 1.10 Standards -- 1.11 Key Terms, Review Questions, and Problems -- Appendix 1A Prefixes for Numerical Units -- PART ONE: REQUIREMENTS -- Chapter 2 Business Information -- 2.1 Audio -- 2.2 Data -- 2.3 Image -- 2.4 Video -- 2.5 Performance Measures -- Application Note: File Sizes -- 2.6 Summary -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Distributed Data Processing -- 3.1 Centralized Versus Distributed Processing -- 3.2 Forms of Distributed Data Processing -- 3.3 Distributed Data -- 3.4 Networking Implications of DDP -- 3.5 Big Data Infrastructure Considerations -- Application Note: Distributed Computing Support -- 3.6 Summary -- 3.7 Key Terms, Review Questions, and Problems -- PART TWO: DATA COMMUNICATIONS -- Chapter 4 Data Transmission -- 4.1 Signals for Conveying Information -- 4.2 Transmission Impairments and Channel Capacity -- Application Note: Analog Signals -- 4.3 Summary -- 4.4 Key Terms, Review Questions, and Problems -- Chapter 5 Data Communication Fundamentals -- 5.1 Analog and Digital Data Communications -- 5.2 Data Encoding Techniques -- 5.3 Asynchronous and Synchronous Transmission -- 5.4 Error Detection -- Application Note: Devices, Encoding, Communication Parameters, and Protocols -- 5.5 Summary.
5.6 Key Terms, Review Questions, and Problems -- Chapter 6 Data Link Control and Multiplexing -- 6.1 Flow Control and Error Control -- 6.2 Motivation for Multiplexing -- 6.3 Frequency-Division Multiplexing -- 6.4 Synchronous Time-Division Multiplexing -- Application Note: Changing Communications -- 6.5 Summary -- 6.6 Key Terms, Review Questions, and Problems -- Appendix 6A: High Level Data Link Control Protocol -- PART THREE: THE INTERNET AND DISTRIBUTED APPLICATIONS -- Chapter 7 The Internet -- 7.1 The Structure of the Internet -- 7.2 Internet Domains -- 7.3 Dynamic Host Configuration Protocol -- Application Note: Fitting DNS into Your Organizational Structure -- 7.4 Summary -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 TCP/IP -- 8.1 A Simple Protocol Architecture -- 8.2 The TCP/IP Architecture -- 8.3 Internetworking -- 8.4 Virtual Private Networks and IP Security -- Application Note: Practical Guide to Networking -- 8.5 Summary -- 8.6 Key Terms, Review Questions, and Problems -- Appendix 8A: TCP, UDP, and IP Details -- Appendix 8B: The Trivial File Transfer Protocol -- Chapter 9 Client/Server, Intranet, and Cloud Computing -- 9.1 The Growth of Client/Server Computing -- 9.2 Client/Server Applications -- 9.3 Middleware -- 9.4 Intranets -- 9.5 Extranets -- 9.6 Service-Oriented Architecture -- 9.7 Cloud Computing -- Application Note: To Be Fat or Thin-That Is the Question -- 9.8 Summary -- 9.9 Key Terms, Review Questions, and Problems -- Chapter 10 Internet-Based Applications -- 10.1 Electronic Mail -- 10.2 Web Access and HTTP -- 10.3 Web Security -- 10.4 Multimedia Applications -- 10.5 Acceptable Use Policies -- Application Note: To Serve or Not to Serve -- 10.6 Summary -- 10.7 Key Terms, Review Questions, and Problems -- Chapter 11 Internet Operation -- 11.1 Internet Addressing -- 11.2 Internet Routing Protocols -- 11.3 Multicasting.
11.4 Quality of Service -- 11.5 Differentiated Services -- 11.6 Service Level Agreements -- 11.7 IP Performance Metrics -- Application Note: Where Does My Network Address Come From? -- 11.8 Summary -- 11.9 Key Terms, Review Questions, and Problems -- PART FOUR: LOCAL AREA NETWORKS -- Chapter 12 LAN Architecture and Infrastructure -- 12.1 Background -- 12.2 LAN Configuration -- 12.3 Guided Transmission Media -- 12.4 LAN Protocol Architecture -- Application Note: Cabling Infrastructure -- 12.5 Summary -- 12.6 Key Terms, Review Questions, and Problems -- Appendix 12A: Decibels and Signal Strength -- Chapter 13 Ethernet, Switches, and Virtual LANs -- 13.1 Traditional Ethernet -- 13.2 Bridges, Hubs, and Switches -- 13.3 High-Speed Ethernet -- 13.4 Virtual LANs -- 13.5 Power over Ethernet -- Application Note: Networking with Ethernet -- 13.6 Summary -- 13.7 Key Terms, Review Questions, and Problems -- Chapter 14 Wireless LANs -- 14.1 Overview -- 14.2 Wi-Fi Architecture and Services -- 14.3 IEEE 802.11 MAC and Physical Layer Standards -- 14.4 Gigabit WLANs -- 14.5 IEEE 802.11 Security Considerations -- Application Note: Deploying WLANs -- 14.6 Summary -- 14.7 Key Terms, Review Questions, and Problems -- PART FIVE: WIDE AREA NETWORKS -- Chapter 15 WAN Technology and Protocols -- 15.1 Switching Techniques -- 15.2 Circuit-Switching Networks -- 15.3 Packet-Switching Networks -- 15.4 Traditional Wide Area Network Alternatives -- 15.5 Voice Over IP -- 15.6 Presence -- 15.7 Summary -- 15.8 Key Terms, Review Questions, and Problems -- Chapter 16 WAN Services -- 16.1 Wide Area Networking Alternatives -- 16.2 Frame Relay -- 16.3 Asynchronous Transfer Mode (ATM) -- 16.4 Multiprotocol Label Switching (MPLS) -- 16.5 Wide Area Ethernet -- Application Note: Off-Site Connectivity Solutions -- 16.6 Summary -- 16.7 Key Terms, Review Questions, and Problems.
Chapter 17 Wireless WANs -- 17.1 Cellular Wireless Network -- 17.2 Multiple Access -- 17.3 Third-Generation Wireless Communication -- 17.4 Fourth-Generation Wireless Communication -- 17.5 Satellite Communications -- Application Note: Laptops, Netbooks, PDAs, and Cell Phones -- 17.6 Summary -- 17.7 Key Terms, Review Questions, and Problems -- PART SIX: MANAGEMENT ISSUES -- Chapter 18 Computer and Network Security Threats -- 18.1 Computer Security Concepts -- 18.2 Threats, Attacks, and Assets -- 18.3 Intruders -- 18.4 Malicious Software Overview -- 18.5 Viruses, Worms, Bots, and Spam -- 18.6 Keyloggers, Phishing, Spyware -- 18.7 Computer Security Trends -- 18.8 Summary -- 18.9 Key Terms, Review Questions, and Problems -- Chapter 19 Computer and Network Security Techniques -- 19.1 Virtual Private Networks and IPsec -- 19.2 SSL and TLS -- 19.3 Wi-Fi Protected Access -- 19.4 Intrusion Detection -- 19.5 Firewalls -- 19.6 Malware Defense -- Application Note: Security Layers -- 19.7 Summary -- 19.8 Key Terms, Review Questions, and Problems -- Appendix A: Projects for Teaching Business Data Communications -- A.1 Animations and Animation Projects -- A.2 Practical Exercises -- A.3 Wireshark Projects -- A.4 Research Projects -- A.5 Security Case Studies -- A.6 Reading/Report Assignments -- A.7 Writing Assignments -- Glossary.
Record Nr. UNINA-9910150214403321
Stallings William  
Boston : , : Pearson, , [2013]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer organization and architecture [[electronic resource]] : designing for performance / / William Stallings
Computer organization and architecture [[electronic resource]] : designing for performance / / William Stallings
Autore Stallings William
Edizione [Tenth, global edition.]
Pubbl/distr/stampa Boston : , : Pearson, , [2016]
Descrizione fisica 1 online resource (861 pages) : illustrations (some color)
Disciplina 004.22
Collana Always learning
Soggetto topico Computer architecture
ISBN 9781292096858
9781292096865
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Inside Front Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Preface -- About the Author -- Part One Introduction -- Chapter 1 Basic Concepts and Computer Evolution -- 1.1 Organization and Architecture -- 1.2 Structure and Function -- 1.3 A Brief History of Computers -- 1.4 The Evolution of the Intel x86 Architecture -- 1.5 Embedded Systems -- 1.6 Arm Architecture -- 1.7 Cloud Computing -- 1.8 Key Terms, Review Questions, and Problems -- Chapter 2 Performance Issues -- 2.1 Designing for Performance -- 2.2 Multicore, Mics, and Gpgpus -- 2.3 Two Laws that Provide Insight: Ahmdahl's Law and Little's Law -- 2.4 Basic Measures of Computer Performance -- 2.5 Calculating the Mean -- 2.6 Benchmarks and Spec -- 2.7 Key Terms, Review Questions, and Problems -- Part Two The Computer System -- Chapter 3 A Top- Level View of Computer Function and Interconnection -- 3.1 Computer Components -- 3.2 Computer Function -- 3.3 Interconnection Structures -- 3.4 Bus Interconnection -- 3.5 Point-to-Point Interconnect -- 3.6 Pci Express -- 3.7 Key Terms, Review Questions, and Problems -- Chapter 4 Cache Memory -- 4.1 Computer Memory System Overview -- 4.2 Cache Memory Principles -- 4.3 Elements of Cache Design -- 4.4 Pentium 4 Cache Organization -- 4.5 Key Terms, Review Questions, and Problems -- Appendix 4A Performance Characteristics of Two- Level Memories -- Chapter 5 Internal Memory -- 5.1 Semiconductor Main Memory -- 5.2 Error Correction -- 5.3 DDR Dram -- 5.4 Flash Memory -- 5.5 Newer Nonvolatile Solid-State Memory Technologies -- 5.6 Key Terms, Review Questions, and Problems -- Chapter 6 External Memory -- 6.1 Magnetic Disk -- 6.2 Raid -- 6.3 Solid State Drives -- 6.4 Optical Memory -- 6.5 Magnetic Tape -- 6.6 Key Terms, Review Questions, and Problems -- Chapter 7 Input/Output -- 7.1 External Devices -- 7.2 I/O Modules.
7.3 Programmed I/O -- 7.4 Interrupt-Driven I/O -- 7.5 Direct Memory Access -- 7.6 Direct Cache Access -- 7.7 I/O Channels and Processors -- 7.8 External Interconnection Standards -- 7.9 IBM zEnterprise EC12 I/O Structure -- 7.10 Key Terms, Review Questions, and Problems -- Chapter 8 Operating System Support -- 8.1 Operating System Overview -- 8.2 Scheduling -- 8.3 Memory Management -- 8.4 Intel x86 Memory Management -- 8.5 Arm Memory Management -- 8.6 Key Terms, Review Questions, and Problems -- Part Three Arithmetic and Logic -- Chapter 9 Number Systems -- 9.1 The Decimal System -- 9.2 Positional Number Systems -- 9.3 The Binary System -- 9.4 Converting Between Binary and Decimal -- 9.5 Hexadecimal Notation -- 9.6 Key Terms and Problems -- Chapter 10 Computer Arithmetic -- 10.1 The Arithmetic and Logic Unit -- 10.2 Integer Representation -- 10.3 Integer Arithmetic -- 10.4 Floating- Point Representation -- 10.5 Floating-Point Arithmetic -- 10.6 Key Terms, Review Questions, and Problems -- Chapter 11 Digital Logic -- 11.1 Boolean Algebra -- 11.2 Gates -- 11.3 Combinational Circuits -- 11.4 Sequential Circuits -- 11.5 Programmable Logic Devices -- 11.6 Key Terms and Problems -- Part Four The Central Processing Unit -- Chapter 12 Instruction Sets: Characteristics and Functions -- 12.1 Machine Instruction Characteristics -- 12.2 Types of Operands -- 12.3 Intel x86 and ARM Data Types -- 12.4 Types of Operations -- 12.5 Intel x86 and ARM Operation Types -- 12.6 Key Terms, Review Questions, and Problems -- Appendix 12A Little-, Big-, and Bi-Endian -- Chapter 13 Instruction Sets: Addressing Modes and Formats -- 13.1 Addressing Modes -- 13.2 x86 and ARM Addressing Modes -- 13.3 Instruction Formats -- 13.4 x86 and ARM Instruction Formats -- 13.5 Assembly Language -- 13.6 Key Terms, Review Questions, and Problems -- Chapter 14 Processor Structure and Function.
14.1 Processor Organization -- 14.2 Register Organization -- 14.3 Instruction Cycle -- 14.4 Instruction Pipelining -- 14.5 The x86 Processor Family -- 14.6 The ARM Processor -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Reduced Instruction Set Computers -- 15.1 Instruction Execution Characteristics -- 15.2 The Use of a Large Register File -- 15.3 Compiler-Based Register Optimization -- 15.4 Reduced Instruction Set Architecture -- 15.5 RISC Pipelining -- 15.6 MIPS R4000 -- 15.7 SPARC -- 15.8 RISC versus CISC Controversy -- 15.9 Key Terms, Review Questions, and Problems -- Chapter 16 Instruction-Level Parallelism and Superscalar Processors -- 16.1 Overview -- 16.2 Design Issues -- 16.3 Intel Core Microarchitecture -- 16.4 ARM Cortex-A8 -- 16.5 ARM Cortex-M3 -- 16.6 Key Terms, Review Questions, and Problems -- Part Five Parallel Organization -- Chapter 17 Parallel Processing -- 17.1 Multiple Processor Organizations -- 17.2 Symmetric Multiprocessors -- 17.3 Cache Coherence and the MESI Protocol -- 17.4 Multithreading and Chip Multiprocessors -- 17.5 Clusters -- 17.6 Nonuniform Memory Access -- 17.7 Cloud Computing -- 17.8 Key Terms, Review Questions, and Problems -- Chapter 18 Multicore Computers -- 18.1 Hardware Performance Issues -- 18.2 Software Performance Issues -- 18.3 Multicore Organization -- 18.4 Heterogeneous Multicore Organization -- 18.5 Intel Core i7-990X -- 18.6 ARM Cortex-A15 MPCore -- 18.7 IBM zEnterprise EC12 Mainframe -- 18.8 Key Terms, Review Questions, and Problems -- Chapter 19 General-Purpose Graphic Processing Units -- 19.1 Cuda Basics -- 19.2 GPU versus CPU -- 19.3 GPU Architecture Overview -- 19.4 Intel's Gen8 GPU -- 19.5 When to Use a GPU as a Coprocessor -- 19.6 Key Terms and Review Questions -- Part Six T he Control Unit -- Chapter 20 Control Unit Operation -- 20.1 Micro-Operations.
20.2 Control of the Processor -- 20.3 Hardwired Implementation -- 20.4 Key Terms, Review Questions, and Problems -- Chapter 21 Microprogrammed Control -- 21.1 Basic Concepts -- 21.2 Microinstruction Sequencing -- 21.3 Microinstruction Execution -- 21.4 TI 8800 -- 21.5 Key Terms, Review Questions, and Problems -- Appendix A Projects for Teaching Computer Organization and Architecture -- A.1 Interactive Simulations -- A.2 Research Projects -- A.3 Simulation Projects -- A.4 Assembly Language Projects -- A.5 Reading/Report Assignments -- A.6 Writing Assignments -- A.7 Test Bank -- Appendix B Assembly Language and Related Topics -- B.1 Assembly Language -- B.2 Assemblers -- B.3 Loading and Linking -- B.4 Key Terms, Review Questions, and Problems -- References -- Index -- Credits.
Record Nr. UNINA-9910154764703321
Stallings William  
Boston : , : Pearson, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer security : principles and practice / / William Stallings, Lawrie Brown
Computer security : principles and practice / / William Stallings, Lawrie Brown
Autore Stallings William
Edizione [Third edition, Global edition.]
Pubbl/distr/stampa Boston : , : Pearson, , [2015]
Descrizione fisica 1 online resource (840 pages) : illustrations
Disciplina 005.8
Collana Always Learning
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-292-06620-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title -- Copyright -- Contents -- Online Resources -- Preface -- Notation -- About the Authors -- Chapter 0 Reader's and Instructor's Guide -- 0.1 Outline of this Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Support for Cisp Certification -- 0.4 Support for NSA/DHS Certification -- 0.5 Support for ACM/IEEE Computer Society Computer Science Curricula 2013 -- 0.6 Internet and Web Resources -- 0.7 Standards -- Chapter 1 Overview -- 1.1 Computer Security Concepts -- 1.2 Threats, Attacks, and Assets -- 1.3 Security Functional Requirements -- 1.4 Fundamental Security Design Principles -- 1.5 Attack Surfaces and Attack Trees -- 1.6 Computer Security Strategy -- 1.7 Recommended Reading -- 1.8 Key Terms, Review Questions, and Problems -- Part One Computer Security Technology and Principles -- Chapter 2 Cryptographic Tools -- 2.1 Confidentiality with Symmetric Encryption -- 2.2 Message Authentication and Hash Functions -- 2.3 Public-Key Encryption -- 2.4 Digital Signatures and Key Management -- 2.5 Random and Pseudorandom Numbers -- 2.6 Practical Application: Encryption of Stored Data -- 2.7 Recommended Reading -- 2.8 Key Terms, Review Questions, and Problems -- Chapter 3 User Authentication -- 3.1 Electronic User Authentication Principles -- 3.2 Password-Based Authentication -- 3.3 Token-Based Authentication -- 3.4 Biometric Authentication -- 3.5 Remote User Authentication -- 3.6 Security Issues for User Authentication -- 3.7 Practical Application: An Iris Biometric System -- 3.8 Case Study: Security Problems for ATM Systems -- 3.9 Recommended Reading -- 3.10 Key Terms, Review Questions, and Problems -- Chapter 4 Access Control -- 4.1 Access Control Principles -- 4.2 Subjects, Objects, and Access Rights -- 4.3 Discretionary Access Control -- 4.4 Example: UNIX File Access Control -- 4.5 Role-Based Access Control.
4.6 Attribute-Based Access Control -- 4.7 Identity, Credential, and Access Management -- 4.8 Trust Frameworks -- 4.9 Case Study: RBAC System for a Bank -- 4.10 Recommended Reading -- 4.11 Key Terms, Review Questions, and Problems -- Chapter 5 Database and Cloud Security -- 5.1 The Need for Database Security -- 5.2 Database Management Systems -- 5.3 Relational Databases -- 5.4 SQL Injection Attacks -- 5.5 Database Access Control -- 5.6 Inference -- 5.7 Database Encryption -- 5.8 Cloud Computing -- 5.9 Cloud Security Risks and Countermeasures -- 5.10 Data Protection in the Cloud -- 5.11 Cloud Security as a Service -- 5.12 Recommended Reading -- 5.13 Key Terms, Review Questions, and Problems -- Chapter 6 Malicious Software -- 6.1 Types of Malicious Software (Malware) -- 6.2 Advanced Persistent Threat -- 6.3 Propagation-Infected Content-Viruses -- 6.4 Propagation-Vulnerability Exploit-Worms -- 6.5 Propagation-Social Engineering-Spam E-Mail, Trojans -- 6.6 Payload-System Corruption -- 6.7 Payload-Attack Agent-Zombie, Bots -- 6.8 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 6.9 Payload-Stealthing-Backdoors, Rootkits -- 6.10 Countermeasures -- 6.11 Recommended Reading -- 6.12 Key Terms, Review Questions, and Problems -- Chapter 7 Denial-of-Service Attacks -- 7.1 Denial-of-Service Attacks -- 7.2 Flooding Attacks -- 7.3 Distributed Denial-of-Service Attacks -- 7.4 Application-Based Bandwidth Attacks -- 7.5 Reflector and Amplifier Attacks -- 7.6 Defenses Against Denial-of-Service Attacks -- 7.7 Responding to a Denial-of-Service Attack -- 7.8 Recommended Reading -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Intrusion Detection -- 8.1 Intruders -- 8.2 Intrusion Detection -- 8.3 Analysis Approaches -- 8.4 Host-Based Intrusion Detection -- 8.5 Network-Based Intrusion Detection -- 8.6 Distributed or Hybrid Intrusion Detection.
8.7 Intrusion Detection Exchange Format -- 8.8 Honeypots -- 8.9 Example System: Snort -- 8.10 Recommended Reading -- 8.11 Key Terms, Review Questions, and Problems -- Chapter 9 Firewalls and Intrusion Prevention Systems -- 9.1 The Need for Firewalls -- 9.2 Firewall Characteristics and Access Policy -- 9.3 Types of Firewalls -- 9.4 Firewall Basing -- 9.5 Firewall Location and Configurations -- 9.6 Intrusion Prevention Systems -- 9.7 Example: Unified Threat Management Products -- 9.8 Recommended Reading -- 9.9 Key Terms, Review Questions, and Problems -- Part Two Software Security and Trusted Systems -- Chapter 10 Buffer Overflow -- 10.1 Stack Overflows -- 10.2 Defending Against Buffer Overflows -- 10.3 Other Forms of Overflow Attacks -- 10.4 Recommended Reading -- 10.5 Key Terms, Review Questions, and Problems -- Chapter 11 Software Security -- 11.1 Software Security Issues -- 11.2 Handling Program Input -- 11.3 Writing Safe Program Code -- 11.4 Interacting with the Operating System and Other Programs -- 11.5 Handling Program Output -- 11.6 Recommended Reading -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Operating System Security -- 12.1 Introduction to Operating System Security -- 12.2 System Security Planning -- 12.3 Operating Systems Hardening -- 12.4 Application Security -- 12.5 Security Maintenance -- 12.6 Linux/Unix Security -- 12.7 Windows Security -- 12.8 Virtualization Security -- 12.9 Recommended Reading -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Trusted Computing and Multilevel Security -- 13.1 The Bell-LaPadula Model for Computer Security -- 13.2 Other Formal Models for Computer Security -- 13.3 The Concept of Trusted Systems -- 13.4 Application of Multilevel Security -- 13.5 Trusted Computing and the Trusted Platform Module -- 13.6 Common Criteria for Information Technology Security Evaluation.
13.7 Assurance and Evaluation -- 13.8 Recommended Reading -- 13.9 Key Terms, Review Questions, and Problems -- Part Three Management Isues -- Chapter 14 IT Security Management and Risk Assessment -- 14.1 IT Security Management -- 14.2 Organizational Context and Security Policy -- 14.3 Security Risk Assessment -- 14.4 Detailed Security Risk Analysis -- 14.5 Case Study: Silver Star Mines -- 14.6 Recommended Reading -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 IT Security Controls, Plans, and Procedures -- 15.1 IT Security Management Implementation -- 15.2 Security Controls or Safeguards -- 15.3 IT Security Plan -- 15.4 Implementation of Controls -- 15.5 Monitoring Risks -- 15.6 Case Study: Silver Star Mines -- 15.7 Recommended Reading -- 15.8 Key Terms, Review Questions, and Problems -- Chapter 16 Physical and Infrastructure Security -- 16.1 Overview -- 16.2 Physical Security Threats -- 16.3 Physical Security Prevention and Mitigation Measures -- 16.4 Recovery From Physical Security Breaches -- 16.5 Example: A Corporate Physical Security Policy -- 16.6 Integration of Physical and Logical Security -- 16.7 Recommended Reading -- 16.8 Key Terms, Review Questions, and Problems -- Chapter 17 Human Resources Security -- 17.1 Security Awareness, Training, and Education -- 17.2 Employment Practices and Policies -- 17.3 E-Mail and Internet Use Policies -- 17.4 Computer Security Incident Response Teams -- 17.5 Recommended Reading -- 17.6 Key Terms, Review Questions, and Problems -- Chapter 18 Security Auditing -- 18.1 Security Auditing Architecture -- 18.2 Security Audit Trail -- 18.3 Implementing the Logging Function -- 18.4 Audit Trail Analysis -- 18.5 Example: An Integrated Approach -- 18.6 Recommended Reading -- 18.7 Key Terms, Review Questions, and Problems -- Chapter 19 Legal and Ethical Aspects -- 19.1 Cybercrime and Computer Crime.
19.2 Intellectual Property -- 19.3 Privacy -- 19.4 Ethical Issues -- 19.5 Recommended Reading -- 19.6 Key Terms, Review Questions, and Problems -- Part Four Cryptographic Algorithms -- Chapter 20 Symmetric Encryption and Message Confidentiality -- 20.1 Symmetric Encryption Principles -- 20.2 Data Encryption Standard -- 20.3 Advanced Encryption Standard -- 20.4 Stream Ciphers and RC4 -- 20.5 Cipher Block Modes of Operation -- 20.6 Location of Symmetric Encryption Devices -- 20.7 Key Distribution -- 20.8 Recommended Reading -- 20.9 Key Terms, Review Questions, and Problems -- Chapter 21 Public-Key Cryptography and Message Authentication -- 21.1 Secure Hash Functions -- 21.2 HMAC -- 21.3 The RSA Public-Key Encryption Algorithm -- 21.4 Diffie-Hellman and Other Asymmetric Algorithms -- 21.5 Recommended Reading -- 21.6 Key Terms, Review Questions, and Problems -- Part Five Network Security -- Chapter 22 Internet Security Protocols and Standards -- 22.1 Secure E-Mail and S/MIME -- 22.2 DomainKeys Identified Mail -- 22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) -- 22.4 HTTPS -- 22.5 IPv4 and IPv6 Security -- 22.6 Recommended Reading -- 22.7 Key Terms, Review Questions, and Problems -- Chapter 23 Internet Authentication Applications -- 23.1 Kerberos -- 23.2 X.509 -- 23.3 Public-Key Infrastructure -- 23.4 Recommended Reading -- 23.5 Key Terms, Review Questions, and Problems -- Chapter 24 Wireless Network Security -- 24.1 Wireless Security -- 24.2 Mobile Device Security -- 24.3 IEEE 802.11 Wireless LAN Overview -- 24.4 IEEE 802.11i Wireless LAN Security -- 24.5 Recommended Reading -- 24.6 Key Terms, Review Questions, and Problems -- Appendix A Projects and Other Student Exercises for Teaching Computer Security -- A.1 Hacking Project -- A.2 Laboratory Exercises -- A.3 Security Education (SEED) Projects -- A.4 Research Projects.
A.5 Programming Projects.
Record Nr. UNINA-9910154774103321
Stallings William  
Boston : , : Pearson, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography and network security : principles and practice / / William Stallings
Cryptography and network security : principles and practice / / William Stallings
Autore Stallings William
Edizione [Seventh, global edition.]
Pubbl/distr/stampa Boston : , : Pearson, , [2017]
Descrizione fisica 1 online resource (766 pages) : illustrations ;
Disciplina 005.82
Collana Always learning
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 9781292158594
9781292158587
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures
Record Nr. UNINA-9910154943503321
Stallings William  
Boston : , : Pearson, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography and network security : principles and practice / / William Stallings ; contributions by Mohit P. Tahiliani
Cryptography and network security : principles and practice / / William Stallings ; contributions by Mohit P. Tahiliani
Autore Stallings William
Edizione [Sixth edition.]
Pubbl/distr/stampa Boston, [Massachusetts] : , : Pearson, , 2014
Descrizione fisica 1 online resource (755 pages) : illustrations
Disciplina 005.8
Collana Always Learning
Soggetto topico Computer networks - Security measures
Data encryption (Computer science)
Coding theory
ISBN 9781488682957
9780273793359
1-4886-8295-X
0-273-79376-4
Formato Multimedia
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Contents -- Notation -- Preface -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of This Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Chapter 1 Overview -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Recommended Reading -- 1.8 Key Terms, Review Questions, and Problems -- PART ONE: SYMMETRIC CIPHERS -- Chapter 2 Classical Encryption Techniques -- 2.1 Symmetric Cipher Model -- 2.2 Substitution Techniques -- 2.3 Transposition Techniques -- 2.4 Rotor Machines -- 2.5 Steganography -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Block Ciphers and the Data Encryption Standard -- 3.1 Traditional Block Cipher Structure -- 3.2 The Data Encryption Standard -- 3.3 A DES Example -- 3.4 The Strength of DES -- 3.5 Block Cipher Design Principles -- 3.6 Recommended Reading -- 3.7 Key Terms, Review Questions, and Problems -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- 4.1 Divisibility and the Division Algorithm -- 4.2 The Euclidean Algorithm -- 4.3 Modular Arithmetic -- 4.4 Groups, Rings, and Fields -- 4.5 Finite Fields of the Form GF(p) -- 4.6 Polynomial Arithmetic -- 4.7 Finite Fields of the Form GF(2(Sup[n])) -- 4.8 Recommended Reading -- 4.9 Key Terms, Review Questions, and Problems -- Appendix 4A The Meaning of mod -- Chapter 5 Advanced Encryption Standard -- 5.1 Finite Field Arithmetic -- 5.2 AES Structure -- 5.3 AES Transformation Functions -- 5.4 AES Key Expansion -- 5.5 An AES Example -- 5.6 AES Implementation -- 5.7 Recommended Reading -- 5.8 Key Terms, Review Questions, and Problems -- Appendix 5A Polynomials with Coefficients in GF(2(Sup[8])) -- Appendix 5B Simplified AES.
Chapter 6 Block Cipher Operation -- 6.1 Multiple Encryption and Triple DES -- 6.2 Electronic Code book -- 6.3 Cipher Block Chaining Mode -- 6.4 Cipher Feedback Mode -- 6.5 Output Feedback Mode -- 6.6 Counter Mode -- 6.7 XTS-AES Mode for Block-Oriented Storage Devices -- 6.8 Recommended Reading -- 6.9 Key Terms, Review Questions, and Problems -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- 7.1 Principles of Pseudorandom Number Generation -- 7.2 Pseudorandom Number Generators -- 7.3 Pseudorandom Number Generation Using a Block Cipher -- 7.4 Stream Ciphers -- 7.5 RC4 -- 7.6 True Random Number Generators -- 7.7 Recommended Reading -- 7.8 Key Terms, Review Questions, and Problems -- PART TWO: ASYMMETRIC CIPHERS -- Chapter 8 More Number Theory -- 8.1 Prime Numbers -- 8.2 Fermat's and Euler's Theorems -- 8.3 Testing for Primality -- 8.4 The Chinese Remainder Theorem -- 8.5 Discrete Logarithms -- 8.6 Recommended Reading -- 8.7 Key Terms, Review Questions, and Problems -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Recommended Reading -- 9.4 Key Terms, Review Questions, and Problems -- Appendix 9A The Complexity of Algorithms -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Recommended Reading -- 10.7 Key Terms, Review Questions, and Problems -- PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA).
11.6 SHA-3 -- 11.7 Recommended Reading -- 11.8 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation using Hash Functions and MACs -- 12.10 Recommended Reading -- 12.11 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- PART FOUR: MUTUAL TRUST -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Recommended Reading -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Recommended Reading -- 15.8 Key Terms, Review Questions, and Problems -- PART FIVE: NETWORK AND INTERNET SECURITY -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control.
16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Recommended Reading -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Secure Sockets Layer -- 17.3 Transport Layer Security -- 17.4 HTTPS -- 17.5 Secure Shell (SSH) -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Recommended Reading -- 18.6 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Pretty Good Privacy -- 19.2 S/MIME -- 19.3 DomainKeys Identified Mail -- 19.4 Recommended Reading -- 19.5 Key Terms, Review Questions, and Problems -- Appendix 19A Radix-64 Conversion -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Recommended Reading -- 20.8 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality.
B.2 Chapter 2: Classical Encryption -- B.3 Chapter 3: Block Ciphers and the Data Encryption Standard -- B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields -- B.5 Chapter 5: Advanced Encryption Standard -- B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphers -- B.7 Chapter 8: Number Theory -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures -- References -- Credits -- Index.
Record Nr. UNINA-9910151655203321
Stallings William  
Boston, [Massachusetts] : , : Pearson, , 2014
Multimedia
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and computer communications / / William Stallings ; international edition contributions by Moumita Mitra Manna (Bangabasi College, Kolkata)
Data and computer communications / / William Stallings ; international edition contributions by Moumita Mitra Manna (Bangabasi College, Kolkata)
Autore Stallings William
Edizione [Tenth edition.]
Pubbl/distr/stampa Boston : , : Pearson, , [2014]
Descrizione fisica 1 online resource (914 pages) : color illustrations, tables
Disciplina 004.6
Altri autori (Persone) MannaMoumita Mitra
Collana Always learning
Soggetto topico Dades - Transmissió
Data transmission systems
ISBN 1-292-01439-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Contents -- Preface -- Acknowledgments -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of the Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Unit One Fundamentals -- Part One Overview -- Chapter 1 Data Communications, Data Networks, and the Internet -- 1.1 Data Communications and Networking for Today's Enterprise -- 1.2 A Communications Model -- 1.3 Data Communications -- 1.4 Networks -- 1.5 The Internet -- 1.6 An Example Configuration -- Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications -- 2.1 The Need for a Protocol Architecture -- 2.2 A Simple Protocol Architecture -- 2.3 The TCP/IP Protocol Architecture -- 2.4 Standardization within a Protocol Architecture -- 2.5 Traditional Internet-Based Applications -- 2.6 Multimedia -- 2.7 Sockets Programming -- 2.8 Recommended Reading and Animation -- 2.9 Key Terms, Review Questions, and Problems -- 2.10 Sockets Programming Assignments -- Appendix 2A The Trivial File Transfer Protocol -- Part Two Data Communications -- Chapter 3 Data Transmission -- 3.1 Concepts and Terminology -- 3.2 Analog and Digital Data Transmission -- 3.3 Transmission Impairments -- 3.4 Channel Capacity -- 3.5 Recommended Reading -- 3.6 Key Terms, Review Questions, and Problems -- Appendix 3A Decibels and Signal Strength -- Chapter 4 Transmission Media -- 4.1 Guided Transmission Media -- 4.2 Wireless Transmission -- 4.3 Wireless Propagation -- 4.4 Line-of-Sight Transmission -- 4.5 Recommended Reading -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Signal Encoding Techniques -- 5.1 Digital Data, Digital Signals -- 5.2 Digital Data, Analog Signals -- 5.3 Analog Data, Digital Signals -- 5.4 Recommended Reading and Animations -- 5.5 Key Terms, Review Questions, and Problems -- Chapter 6 Error Detection and Correction -- 6.1 Types of Errors -- 6.2 Error Detection -- 6.3 Parity Check -- 6.4 The Internet Checksum -- 6.5 Cyclic Redundancy Check (CRC) -- 6.6 Forward Error Correction -- 6.7 Recommended Reading and Animations -- 6.8 Key Terms, Review Questions, and Problems -- Chapter 7 Data Link Control Protocols -- 7.1 Flow Control -- 7.2 Error Control -- 7.3 High-Level Data Link Control (HDLC) -- 7.4 Recommended Reading and Animations -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 Multiplexing -- 8.1 Frequency-Division Multiplexing -- 8.2 Synchronous Time-Division Multiplexing -- 8.3 Cable Modem -- 8.4 Asymmetric Digital Subscriber Line -- 8.5 xDSL -- 8.6 Multiple Channel Access -- 8.7 Recommended Reading and Animations -- 8.8 Key Terms, Review Questions, and Problems -- Part Three Wide Area Networks -- Chapter 9 WAN Technology and Protocols -- 9.1 Switched Communications Networks -- 9.2 Circuit-Switching Networks -- 9.3 Circuit-Switching Concepts -- 9.4 Softswitch Architecture -- 9.5 Packet-Switching Principles -- 9.6 Asynchronous Transfer Mode -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- Chapter 10 Cellular Wireless Networks -- 10.1 Principles of Cellular Networks -- 10.2 Cellular Network Generations -- 10.3 LTE-Advanced -- 10.4 Recommended Reading -- 10.5 Key Terms, Review Questions, and Problems -- Part Four Local Area Networks -- Chapter 11 Local Area Network Overview -- 11.1 Bus and Star Topologies -- 11.2 LAN Protocol Architecture -- 11.3 Bridges -- 11.4 Hubs and Switches -- 11.5 Virtual LANs -- 11.6 Recommended Reading and Animations -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Ethernet -- 12.1 Traditional Ethernet -- 12.2 High-Speed Ethernet -- 12.3 IEEE 802.1Q VLAN Standard -- 12.4 Recommended Reading and Animations -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 24.3 Web Access and HTTP -- 24.4 Recommended Reading and Animations -- 24.5 Key Terms, Review Questions, and Problems -- Chapter 25 Internet Multimedia Support -- 25.1 Real-Time Traffic -- 25.2 Voice Over IP -- 25.3 Session Initiation Protocol -- 25.4 Real-Time Transport Protocol (RTP) -- 25.5 Recommended Reading -- 25.6 Key Terms, Review Questions, and Problems.
Record Nr. UNINA-9910153256603321
Stallings William  
Boston : , : Pearson, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar
Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar
Autore Stallings William
Edizione [Fifth edition, international edition.]
Pubbl/distr/stampa Boston, [Massachusetts] : , : Pearson, , 2014
Descrizione fisica 1 online resource (447 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer security
ISBN 0-273-79380-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Contents -- Online Resources -- Preface -- About the Author -- Chapter 1 Introduction -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Standards -- 1.8 Outline of This Book -- 1.9 Recommended Reading -- 1.10 Internet and Web Resources -- 1.11 Key Terms, Review Questions, and Problems -- PART ONE: CRYPTOGRAPHY -- Chapter 2 Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Block Encryption Algorithms -- 2.3 Random and Pseudorandom Numbers -- 2.4 Stream Ciphers and RC4 -- 2.5 Cipher Block Modes of Operation -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions -- 3.3 Message Authentication Codes -- 3.4 Public-Key Cryptography Principles -- 3.5 Public-Key Cryptography Algorithms -- 3.6 Digital Signatures -- 3.7 Recommended Reading -- 3.8 Key Terms, Review Questions, and Problems -- PART TWO: NETWORK SECURITY APPLICATIONS -- Chapter 4 Key Distribution and User Authentication -- 4.1 Symmetric Key Distribution Using Symmetric Encryption -- 4.2 Kerberos -- 4.3 Key Distribution Using Asymmetric Encryption -- 4.4 X.509 Certificates -- 4.5 Public-Key Infrastructure -- 4.6 Federated Identity Management -- 4.7 Recommended Reading -- 4.8 Key Terms, Review Questions, and Problems -- Chapter 5 Network Access Control and Cloud Security -- 5.1 Network Access Control -- 5.2 Extensible Authentication Protocol -- 5.3 IEEE 802.1X Port-Based Network Access Control -- 5.4 Cloud Computing -- 5.5 Cloud Security Risks and Countermeasures -- 5.6 Data Protection in the Cloud -- 5.7 Cloud Security as a Service.
5.8 Recommended Reading -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Transport-Level Security -- 6.1 Web Security Considerations -- 6.2 Secure Sockets Layer (SSL) -- 6.3 Transport Layer Security (TLS) -- 6.4 HTTPS -- 6.5 Secure Shell (SSH) -- 6.6 Recommended Reading -- 6.7 Key Terms, Review Questions, and Problems -- Chapter 7 Wireless Network Security -- 7.1 Wireless Security -- 7.2 Mobile Device Security -- 7.3 IEEE 802.11 Wireless LAN Overview -- 7.4 IEEE 802.11i Wireless LAN Security -- 7.5 Recommended Reading -- 7.6 Key Terms, Review Questions, and Problems -- Chapter 8 Electronic Mail Security -- 8.1 Pretty Good Privacy (PGP) -- 8.2 S/MIME -- 8.3 DomainKeys Identified Mail (DKIM) -- 8.4 Recommended Reading -- 8.5 Key Terms, Review Questions, and Problems -- Chapter 9 IP Security -- 9.1 IP Security Overview -- 9.2 IP Security Policy -- 9.3 Encapsulating Security Payload -- 9.4 Combining Security Associations -- 9.5 Internet Key Exchange -- 9.6 Cryptographic Suites -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- PART THREE: SYSTEM SECURITY -- Chapter 10 Malicious Software -- 10.1 Types of Malicious Software (Malware) -- 10.2 Propagation-Infected Content-Viruses -- 10.3 Propagation-Vulnerability Exploit-Worms -- 10.4 Propagation-Social Engineering-SPAM E-mail, Trojans -- 10.5 Payload-System Corruption -- 10.6 Payload-Attack Agent-Zombie, Bots -- 10.7 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 10.8 Payload-Stealthing-Backdoors, Rootkits -- 10.9 Countermeasures -- 10.10 Distributed Denial of Service Attacks -- 10.11 Recommended Reading -- 10.12 Key Terms, Review Questions, and Problems -- Chapter 11 Intruders -- 11.1 Intruders -- 11.2 Intrusion Detection -- 11.3 Password Management -- 11.4 Recommended Reading -- 11.5 Key Terms, Review Questions, and Problems -- Chapter 12 Firewalls.
12.1 The Need for Firewalls -- 12.2 Firewall Characteristics -- 12.3 Types of Firewalls -- 12.4 Firewall Basing -- 12.5 Firewall Location and Configurations -- 12.6 Recommended Reading -- 12.7 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Some Aspects of Number Theory -- A.1 Prime and Relatively Prime Numbers -- A.2 Modular Arithmetic -- Appendix B: Projects for Teaching Network Security -- B.1 Research Projects -- B.2 Hacking Project -- B.3 Programming Projects -- B.4 Laboratory Exercises -- B.5 Practical Security Assessments -- B.6 Firewall Projects -- B.7 Case Studies -- B.8 Writing Assignments -- B.9 Reading/Report Assignments -- References -- Credits -- Index.
Record Nr. UNINA-9910151655103321
Stallings William  
Boston, [Massachusetts] : , : Pearson, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / / William Stallings
Operating systems : internals and design principles / / William Stallings
Autore Stallings William
Edizione [Eighth edition, Global edition.]
Pubbl/distr/stampa Harlow, England : , : Pearson, , 2014
Descrizione fisica 1 online resource (804 pages)
Disciplina 005.43
Collana Always Learning
Soggetto topico Operating systems (Computers)
ISBN 1292061944 (ebk.)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Contents -- Online Resources -- VideoNotes -- Preface -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of this Book -- 0.2 Example Systems -- 0.3 A Roadmap for Readers and Instructors -- 0.4 Internet and Web Resources -- Part 1 Background -- Chapter 1 Computer System Overview -- 1.1 Basic Elements -- 1.2 Evolution of the Microprocessor -- 1.3 Instruction Execution -- 1.4 Interrupts -- 1.5 The Memory Hierarchy -- 1.6 Cache Memory -- 1.7 Direct Memory Access -- 1.8 Multiprocessor and Multicore Organization -- 1.9 Recommended Reading -- 1.10 Key Terms, Review Questions, and Problems -- 1A Performance Characteristics of Two-Level -- Chapter 2 Operating System Overview -- 2.1 Operating System Objectives and Functions -- 2.2 The Evolution of Operating Systems -- 2.3 Major Achievements -- 2.4 Developments Leading to Modern Operating Systems -- 2.5 Fault Tolerance -- 2.6 OS Design Considerations for Multiprocessor and Multicore -- 2.7 Microsoft Windows Overview -- 2.8 Traditional UNIX Systems -- 2.9 Modern UNIX Systems -- 2.10 Linux -- 2.11 Android -- 2.12 Recommended Reading and Animations -- 2.13 Key Terms, Review Questions, and Problems -- Part 2 Processes -- Chapter 3 Process Description and Control -- 3.1 What Is a Process? -- 3.2 Process States -- 3.3 Process Description -- 3.4 Process Control -- 3.5 Execution of the Operating System -- 3.6 UNIX SVR4 Process Management -- 3.7 Summary -- 3.8 Recommended Reading and Animations -- 3.9 Key Terms, Review Questions, and Problems -- Chapter 4 Threads -- 4.1 Processes and Threads -- 4.2 Types of Threads -- 4.3 Multicore and Multithreading -- 4.4 Windows 8 Process and Thread Management -- 4.5 Solaris Thread and SMP Management -- 4.6 Linux Process and Thread Management -- 4.7 Android Process and Thread Management -- 4.8 Mac OS X Grand Central Dispatch.
4.9 Summary -- 4.10 Recommended Reading -- 4.11 Key Terms, Review Questions, and Problems -- Chapter 5 Concurrency: Mutual Exclusion -- 5.1 Principles of Concurrency -- 5.2 Mutual Exclusion: Hardware Support -- 5.3 Semaphores -- 5.4 Monitors -- 5.5 Message Passing -- 5.6 Readers/Writers Problem -- 5.7 Summary -- 5.8 Recommended Reading and Animations -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Concurrency: Deadlock and Starvation -- 6.1 Principles of Deadlock -- 6.2 Deadlock Prevention -- 6.3 Deadlock Avoidance -- 6.4 Deadlock Detection -- 6.5 An Integrated Deadlock Strategy -- 6.6 Dining Philosophers Problem -- 6.7 UNIX Concurrency Mechanisms -- 6.8 Linux Kernel Concurrency Mechanisms -- 6.9 Solaris Thread Synchronization Primitives -- 6.10 Windows 7 Concurrency Mechanisms -- 6.11 Android Interprocess Communication -- 6.12 Summary -- 6.13 Recommended Reading and Animations -- 6.14 Key Terms, Review Questions, and Problems -- Part 3 Memory -- Chapter 7 Memory Management -- 7.1 Memory Management Requirements -- 7.2 Memory Partitioning -- 7.3 Paging -- 7.4 Segmentation -- 7.5 Summary -- 7.6 Recommended Reading and Animations -- 7.7 Key Terms, Review Questions, and Problems -- 7A Loading and Linking -- Chapter 8 Virtual Memory -- 8.1 Hardware and Control Structures -- 8.2 Operating System Software -- 8.3 UNIX and Solaris Memory Management -- 8.4 Linux Memory Management -- 8.5 Windows Memory Management -- 8.6 Android Memory Management -- 8.7 Summary -- 8.8 Recommended Reading and Animations -- 8.9 Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Chapter 9 Uniprocessor Scheduling -- 9.1 Types of Processor Scheduling -- 9.2 Scheduling Algorithms -- 9.3 Traditional UNIX Scheduling -- 9.4 Summary -- 9.5 Recommended Reading and Animations -- 9.6 Key Terms, Review Questions, and Problems.
Chapter 10 Multiprocessor, Multicore, and Real-Time -- 10.1 Multiprocessor and Multicore Scheduling -- 10.2 Real-Time Scheduling -- 10.3 Linux Scheduling -- 10.4 UNIX SVR4 Scheduling -- 10.5 UNIX FreeBSD Scheduling -- 10.6 Windows Scheduling -- 10.7 Summary -- 10.8 Recommended Reading -- 10.9 Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- Chapter 11 I/O Management and Disk Scheduling -- 11.1 I/O Devices -- 11.2 Organization of the I/O Function -- 11.3 Operating System Design Issues -- 11.4 I/O Buffering -- 11.5 Disk Scheduling -- 11.6 RAID -- 11.7 Disk Cache -- 11.8 UNIX SVR4 I/O -- 11.9 Linux I/O -- 11.10 Windows I/O -- 11.11 Summary -- 11.12 Recommended Reading and Animations -- 11.13 Key Terms, Review Questions, and Problems -- Chapter 12 File Management -- 12.1 Overview -- 12.2 File Organization and Access -- 12.3 B-Trees -- 12.4 File Directories -- 12.5 File Sharing -- 12.6 Record Blocking -- 12.7 Secondary Storage Management -- 12.8 UNIX File Management -- 12.9 Linux Virtual File System -- 12.10 Windows File System -- 12.11 Android File Management -- 12.12 Summary -- 12.13 Recommended Reading -- 12.14 Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Chapter 13 Embedded Operating Systems -- 13.1 Embedded Systems -- 13.2 Characteristics of Embedded Operating Systems -- 13.3 Embedded Linux -- 13.4 TinyOS -- 13.5 Recommended Reading -- 13.6 Key Terms, Review Questions, and Problems -- Chapter 14 Virtual Machines -- 14.1 Approaches to Virtualization -- 14.2 Processor Issues -- 14.3 Memory Management -- 14.4 I/O Management -- 14.5 VMware ESXi -- 14.6 Microsoft Hyper-V and Xen Variants -- 14.7 Java VM -- 14.8 Linux VServer Virtual Machine Architecture -- 14.9 Android Virtual Machine -- 14.10 Summary -- 14.11 Recommended Reading -- 14.12 Key Terms, Review Questions, and Problems.
Chapter 15 Operating System Security -- 15.1 Intruders and Malicious Software -- 15.2 Buffer Overflow -- 15.3 Access Control -- 15.4 UNIX Access Control -- 15.5 Operating Systems Hardening -- 15.6 Security Maintenance -- 15.7 Windows Security -- 15.8 Summary -- 15.9 Recommended Reading -- 15.10 Key Terms, Review Questions, and Problems -- Chapter 16 Distributed Processing, Client/Server, and Clusters -- 16.1 Client/Server Computing -- 16.2 Distributed Message Passing -- 16.3 Remote Procedure Calls -- 16.4 Clusters -- 16.5 Windows Cluster Server -- 16.6 Beowulf and Linux Clusters -- 16.7 Summary -- 16.8 Recommended Reading -- 16.9 Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Appendix B Programming and Operating System Projects -- References -- Credits -- Index.
Record Nr. UNINA-9910153258703321
Stallings William  
Harlow, England : , : Pearson, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / / William Stallings
Operating systems : internals and design principles / / William Stallings
Autore Stallings William
Edizione [Seventh edition, International edition /]
Pubbl/distr/stampa Harlow, England ; ; Boston : , : Pearson Education, , [2012]
Descrizione fisica 1 online resource (788 pages) : illustrations
Disciplina 005.43
Soggetto topico Operating systems (Computers)
ISBN 1-4479-3014-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Operating Systems -- Contents -- Online Resources -- Preface -- About the Author -- Reader's and Instructor's Guide -- Outline of this Book -- Example Systems -- A Roadmap for Readers and Instructors -- Internet and Web Resources -- Part 1 Background -- Computer System Overview -- Basic Elements -- Evolution of the Microprocessor -- Instruction Execution -- Interrupts -- The Memory Hierarchy -- Cache Memory -- Direct Memory Access -- Multiprocessor and Multicore Organization -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix 1A Performance Characteristics of Two-level Memories -- Operating System Overview -- Operating System Objectives and Functions -- The Evolution of Operating Systems -- Major Achievements -- Developments Leading to Modern Operating Systems -- Virtual Machines -- OS Design Considerations for Multiprocessor and Multicore -- Microsoft Windows Overview -- Traditional UNIX Systems -- Modern UNIX Systems -- Linux -- Linux Vserver Virtual Machine Architecture -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 2 Processes -- Process Description and Control -- What Is a Process? -- Process States -- Process Description -- Process Control -- Execution of the Operating System -- Security Issues -- UNIX SVR4 Process Management -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Threads -- Processes and Threads -- Types of Threads -- Multicore and Multithreading -- Windows 7 Thread and SMP Management -- Solaris Thread and SMP Management -- Linux Process and Thread Management -- Mac OS X Grand Central Dispatch -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Mutual Exclusion and Synchronization -- Principles of Concurrency -- Mutual Exclusion: Hardware Support -- Semaphores.
Monitors -- Message Passing -- Readers/Writers Problem -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Deadlock and Starvation -- Principles of Deadlock -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- An Integrated Deadlock Strategy -- Dining Philosophers Problem -- UNIX Concurrency Mechanisms -- Linux Kernel Concurrency Mechanisms -- Solaris Thread Synchronization Primitives -- Windows 7 Concurrency Mechanisms -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 3 Memory -- Memory Management -- Memory Management Requirements -- Memory Partitioning -- Paging -- Segmentation -- Security Issues -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Appendix 7A Loading and Linking -- Virtual Memory -- Hardware and Control Structures -- Operating System Software -- UNIX and Solaris Memory Management -- Linux Memory Management -- Windows Memory Management -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Uniprocessor Scheduling -- Types of Processor Scheduling -- Scheduling Algorithms -- Traditional UNIX Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Multiprocessor and Real-Time Scheduling -- Multiprocessor Scheduling -- Real-time Scheduling -- Linux Scheduling -- UNIX SVR4 Scheduling -- UNIX FreeBSD Scheduling -- Windows Scheduling -- Linux Virtual Machine Process Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- I/O Management and Disk Scheduling -- I/O Devices -- Organization of the I/O Function -- Operating System Design Issues -- I/O Buffering -- Disk Scheduling -- RAID -- Disk Cache -- UNIX SVR4 I/O -- Linux I/O -- Windows I/O.
Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- File Management -- Overview -- File Organization and Access -- B-Trees -- File Directories -- File Sharing -- Record Blocking -- Secondary Storage Management -- File System Security -- UNIX File Management -- Linux Virtual File System -- Windows File System -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Embedded Operating Systems -- Embedded Systems -- Characteristics of Embedded Operating Systems -- eCos -- TinyOS -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 7 Computer Security -- Computer Security Threats -- Computer Security Concepts -- Threats, Attacks, and Assets -- Intruders -- Malicious Software Overview -- Viruses, Worms, and Bots -- Rootkits -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Computer Security Techniques -- Authentication -- Access Control -- Intrusion Detection -- Malware Defense -- Dealing with Buffer Overflow Attacks -- Windows 7 Security -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 8 Distributed Systems -- Distributed Processing, Client/Server, and Clusters -- Client/Server Computing -- Service-Oriented Architecture -- Distributed Message Passing -- Remote Procedure Calls -- Clusters -- Windows Cluster Server -- Beowulf and Linux Clusters -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Mutual Exclusion: Software Approaches -- Race Conditions and Semaphores -- A Barbershop Problem -- Problems -- Appendix B Programming and Operating System Projects -- OS/161 -- Simulations -- Programming Projects -- Research Projects -- Reading/Report Assignments -- Writing Assignments.
Discussion Topics -- BACI -- Glossary -- References -- Index.
Record Nr. UNINA-9910151651403321
Stallings William  
Harlow, England ; ; Boston : , : Pearson Education, , [2012]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless communications & networks / / William Stallings
Wireless communications & networks / / William Stallings
Autore Stallings William
Edizione [Second, Pearson new international edition.]
Pubbl/distr/stampa Essex, England : , : Pearson, , 2014
Descrizione fisica 1 online resource (555 pages) : illustrations, graphs
Disciplina 621.3822
Collana Pearson custom library
Soggetto topico Wireless communication systems
ISBN 1-292-05552-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Table of Contents -- 1. Introduction -- 2. Transmission Fundamentals -- 3. Communication Networks -- 4. Protocols and the TCP/IP Suite -- 5. Antennas and Propagation -- 6. Signal Encoding Techniques -- 7. Spread Spectrum -- 8. Coding and Error Control -- 9. Satellite Communications -- 10. Cellular Wireless Networks -- 11. Cordless Systems and Wireless Local Loop -- 12. Mobile IP and Wireless Access Protocol -- 13. Wireless LAN Technology -- 14. IEEE 802.11 Wireless LAN Standard -- 15. Bluetooth -- Appendix: Fourier Analysis -- Glossary.
Altri titoli varianti Wireless communications and networks
Record Nr. UNINA-9910153064503321
Stallings William  
Essex, England : , : Pearson, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui