SpringerBriefs in Computer Science

Guide to OSI and TCP/IP Models

Chronologie aller Bände (1 - 3)

Reihe: SpringerBriefs in Computer Science

Die Reihenfolge beginnt mit dem Buch "Guide to OSI and TCP/IP Models". Wer alle Bücher der Reihe nach lesen möchte, sollte mit diesem Band von Mohammed M. Alani beginnen. Der zweite Teil der Reihe "Guide to OSI and TCP/IP Models" ist am 08.07.2014 erschienen. Mit insgesamt 3 Bänden wurde die Reihe über einen Zeitraum von ungefähr 2 Jahren fortgesetzt. Der neueste Band trägt den Titel "Elements of Cloud Computing Security".

  • Anzahl der Bewertungen für die gesamte Reihe: 0
  • Ø Bewertung der Reihe: 0
  • Start der Reihe: 18.03.2014
  • Neueste Folge: 25.07.2016

Diese Reihenfolge enthält 2 unterschiedliche Autoren.

Cover: Guide to OSI and TCP/IP Models
  • Autor: Alani, Mohammed M.
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Buch
  • Veröffentlicht: 18.03.2014
  • Genre: Sonstiges

Guide to OSI and TCP/IP Models

This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP and In ARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3 and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.
Cover: Encrypted Email
  • Autor: Orman, Hilarie
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Buch
  • Veröffentlicht: 17.08.2015
  • Genre: Sonstiges

Encrypted Email

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it.

Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security andnetworks will also find the content valuable.

Cover: Elements of Cloud Computing Security
  • Autor: Alani, Mohammed M.
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Buch
  • Veröffentlicht: 25.07.2016
  • Genre: Sonstiges

Elements of Cloud Computing Security

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

Diesen Artikel teilen