File Size: 9808 KB
Print Length: 500 pages
Simultaneous Device Usage: Up to 4 simultaneous devices, per publisher limits
Publisher: Chapman and Hall/CRC; 1 edition (November 18, 2008)
Publication Date: November 18, 2008
Sold by: Digital Services LLC
Language: English
ASIN: B005H6YE7C
Text-to-Speech: Not enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #604,080 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #164 in Books > Science & Math > Mathematics > Pure Mathematics > Combinatorics #201 in Books > Computers & Technology > Security & Encryption > Encryption #211 in Books > Computers & Technology > Security & Encryption > Cryptography
This is an absolutely excellent book. It breaks down the basic network layers, their headers and their functions in an easy to understand format. It is not overly verbose and provides just the right amount of examples to give the reader a good understanding of how everything works and fits together. It also provides a good "taxonomy," as the author calls it, for classifying the attacks/mitigation techniques that can be implemented for the different network layers. Lastly and probably most importantly the book is written for some who has no knowledge of computer networking. It does and wonderful job of explaining things leaving the reader with an outstanding understanding of that subject.
Required for a class, but not very useful. Material has inaccuracies, isn't well presented, and unoriginal.
This book was alright. I took a class by this professor and used a draft of the final version of this book. The draft had a few inaccuracies, but that's why it was a draft, I would assume the issues are fixed now. The professor does know his stuff, but you should note that is is an introduction to network and general security. If your new to security and you want to learn a good "taxonomy" for network attacks then this is a good place to start, but I've seen better books on security. There are not many real world examples in this book because it is an introduction and it is assumed the skill set is not there yet, also because real world attacks change very quickly. The assignments recommended in this book are good and the accompanying code on the website is a good starter for getting interested in network security. However if you have any sort of network security experience already I would recommend diving into other books instead.
Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series) Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series) Computer Graphics Through OpenGL: From Theory to Experiments (Chapman & Hall/CRC Computer Graphics, Geometric Modeling, and Animation) Introduction to Probability (Chapman & Hall/CRC Texts in Statistical Science) Stochastic Processes: An Introduction, Second Edition (Chapman & Hall/CRC Texts in Statistical Science) An Introduction to Partial Differential Equations with MATLAB (Chapman & Hall/CRC Applied Mathematics & Nonlinear Science) Graphics for Statistics and Data Analysis with R (Chapman & Hall/CRC Texts in Statistical Science) Modeling and Analysis of Stochastic Systems, Second Edition (Chapman & Hall/CRC Texts in Statistical Science) Linear Models with R, Second Edition (Chapman & Hall/CRC Texts in Statistical Science) Computational Partial Differential Equations Using MATLAB (Chapman & Hall/CRC Applied Mathematics & Nonlinear Science) An Introduction to Multicomplex SPates and Functions (Chapman & Hall/CRC Pure and Applied Mathematics) Algorithms in Bioinformatics: A Practical Introduction (Chapman & Hall/CRC Mathematical and Computational Biology) Introduction to Computational Biology: Maps, Sequences and Genomes (Chapman & Hall/CRC Interdisciplinary Statistics) A Concise Introduction to Pure Mathematics, Fourth Edition (Chapman Hall/CRC Mathematics) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Image Processing and Acquisition using Python (Chapman & Hall/CRC Mathematical and Computational Imaging Sciences Series) Data Classification: Algorithms and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series) Numerical Techniques for Direct and Large-Eddy Simulations (Chapman & Hall/CRC Numerical Analysis and Scientific Computing Series) The Garbage Collection Handbook: The Art of Automatic Memory Management (Chapman & Hall/CRC Applied Algorithms and Data Structures series)