Introduction to Computer Networks and Cybersecurity
List price: $63.99
Buy it from $36.14
This item qualifies for FREE shipping
*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: A guide to computer networks and cyber security, this book begins with a presentation of the Internet architecture then proceeds to Internet applications and the development of application software. The book then addresses the link and physical layers, making it easy for students to grasp the concepts surrounding LANs. It covers the network layer including IPv4, IPv6, routers, the various design issues and addresses the transport layer, the numerous aspects of the information infrastructure and computer security. Finally, it addresses the emerging technologies that will alter the current state of multimedia communication and datacenter/cloud computing.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $63.99
Copyright year: 2013
Publisher: CRC Press LLC
Publication date: 2/4/2013
Size: 9.00" wide x 11.00" long x 2.00" tall
|The Internet Architecture|
|An Introduction to Information Networks|
|The Application Layer|
|DNS and Active Directory|
|XML-based Web Services|
|Peer-to-Peer (P2P) Networks and applications|
|Link and Physical Layers|
|Data Link Layer and Phy Layer Overview|
|The Ethernet and Switches|
|Virtual Lan (VLAN), Class of Service (CoS), and Multilayer Networks|
|Wireless and Mobile Networks|
|Network Layer Overview|
|Routing and Interior Gateways|
|Border Gateway Routing|
|The Transport Layer|
|Packet Loss Recovery|
|TCP Congestion Control|
|Cyber Security Overview|
|Intrusion Detection/Prevention System|
|Hash and Authentication|
|Symmetric Key Ciphers and WLAN Security|
|Public Key Cryptography, Infrastructure and Certificates|
|Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security|
|Virtual Private Networks for Network Layer Security|
|Network Access Control and Wireless Network Security|
|Cyber Threats and Defense|
|Network and Information Infrastructure Virtualization|
|Unified Communications and Multimedia Prot|