Logo

Network Security and Management

Small book cover: Network Security and Management

Network Security and Management

Publisher: Wikipedia

Description:
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Ethical HackingEthical Hacking
- HaKTuts
Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(2805 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(12344 views)
Book cover: Information Security and Privacy in Network EnvironmentsInformation Security and Privacy in Network Environments
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(4770 views)
Book cover: Intrusion Detection with SNORTIntrusion Detection with SNORT
by - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(11051 views)