Home > Computing and Information Technology > Computer science > Computer architecture and logic design > A Practical Introduction to Enterprise Network and Security Management
34%
A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful professional career. A Practical Introduction to Enterprise Network and Security Management contains 12 chapters of the correct amount of coverage for a semester or quarter. It balances introductory and fairly advanced subjects on computer networking and cybersecurity to deliver effectively technical and managerial knowledge. It explains sometimes challenging concepts in a manner that students can follow with careful reading. A Practical Introduction to Enterprise Network and Security Management is designed to offer impactful, hands-on learning experiences without relying on a computer lab. First, each chapter comes with practical exercise questions. In the class setting, they are good as individual or group assignments. Many of them are based on simulated or real cases, and take advantage of actual industry products and systems for a reader to better relate theories to practice. Second, there are a number of information-rich screen shots, figures, and tables in each chapter carefully constructed to solidify concepts and thus enhance visual learning. A Practical Introduction to Enterprise Network and Security Management: Is written for students studying management information systems, accounting information systems, or computer science in a semester of 15 to 16 weeks, and exposed to the subject for the first time Takes advantage of many real cases and examples, and actual industry products and services (software, hardware, and configurations) so that students can better relate concepts and theories to practice Explains subjects in a systematic, but very practical manner that students can follow through Provides students with practical understanding of both computer networking and cybersecurity Contains highly practical exercise questions, which can be individual or group assignments within or without the class, included in each chapter to reinforce learning. In addition to the thorough technical details, managerial issues including, enterprise network planning, design, and management from the practitioner’s perspective are embedded throughout the text to assist balanced learning. Bearing in mind of the critical importance of security in today’s enterprise networks, the text discusses the implications of network design and management on enterprise security whenever appropriate. Lastly, to reinforce knowledge in security management further, two chapters introduce the fundamentals of cybersecurity in terms of threat types and defense techniques.

Table of Contents:
Preface Author Chapter 1: Fundamental Concepts 1 Introduction Network Elements Host Client–Server Mode P2P Mode Network Interface Card Intermediary Device Network Link Application Data/Message Protocol Modes of Communication Methods of Data Distribution Unicasting Broadcasting Multicasting Directionality in Data Exchange Simplex Duplex Network Topology Point-to-Point Topology Bus Topology Ring Topology Star (Hub-and-Spoke) Topology Mesh Topology Tree (or Hierarchical) Topology Classification of Networks Personal Area Network Local Area Network Metropolitan Area Network Wide Area Network Rise of Internet of Things Subnetwork versus Inter-network Measures of Network Performance Capacity Data Types and Data Rate Delay Reliability Quality of Service Numbering Systems Binary versus Decimal Binary versus Hexadecimal v vi Contents Network Addressing Characterizing Network Addressing MAC Address IP Address Pairing of MAC and IP Addresses Chapter Summary Key Terms Chapter Review Questions Chapter 2: Architectures and Standards Introduction TCP/IP versus OSI Standard Architecture Standard and Protocol Protocol Data Unit Layer Functions: An Analogy Layer Processing Application Layer (Layer 5) HTTP Demonstration Select Application Layer Protocols Transport Layer (Layer 4) Provision of Data Integrity Error Control Flow Control TCP and Data Integrity UDP and Data Integrity Session Management Session versus No Session Session Management by TCP TCP Session in Real Setting Additional Notes Port Management Port Types and Ranges Source versus Destination Port Socket Internet Layer (Layer 3) Packet Creation and Routing Decision Packet Creation Packet Routing Decision Performing Supervisory Functions Data Link Layer (Layer 2) LAN Data Link Frame and Switching Link Types Technology Standard(s) Single Active Delivery Path Frame’s MAC Addresses WAN Data Link Physical Layer (Layer 1) Layer Implementation Application Layer Transport and Internet Layers Data link and Physical Layers Chapter Summary Key Terms Chapter Review Questions Chapter 3: Intermediary Devices Introduction Intermediary Devices Operational Layers Operating System General Attributes Access to Operating System Hub (Multiport Repeater) Bridge and Wireless Access Point Switch General Features Switch Port Switch Table Switch Table Entries Switch Learning Aging of Entries Switch Types Nonmanaged versus Managed Switches Store-and-Forward versus Cut-Through Switches Symmetric versus Asymmetric Switches Layer 2 versus Layer 3 Switches Fixed, Stackable, and Modular Switches Power over Ethernet Security Issues Safeguarding Switch Ports Port Mirroring Routers Two Primary Functions Routing Table Development and Its Update Packet Forwarding Router Components Router Ports and Naming Router Configuration Basic Features Advanced Features Switching versus Routing Data Link Layer versus Internet Layer Connection-Oriented versus Connectionless Single Delivery versus Multiple Delivery Paths Address Resolution Protocol Background ARP Usage Scenarios Choice of Intermediary Devices Collision versus Broadcast Domains Collision Domain Collision Domain Types Collision Domain and Network Design CSMA/CD Broadcast Domain viii Contents Chapter Summary Key Terms Chapter Review Questions Chapter 4: Elements of Data Transmissions Introduction Data Transmission Elements Digital Signaling On/Off Signaling Voltage Signaling Analog Signaling Properties of Analog Signal Modulation Signaling Devices Modem and Analog Signaling CSU/DSU and Digital Signaling Bandwidth and Related Concepts Bandwidth Baseband and Broadband Synchronous versus Asynchronous Transmissions Asynchronous Transmission Synchronous Transmission Multiplexing Frequency Division Multiplexing FDM Example: ADSL Time Division Multiplexing TDM Example: T-1 Line Spread Spectrum Digital Speed Hierarchies Digital Signal Optical Carrier/Synchronous Transport Module Networking Media Propagation Effects Attenuation Distortion Twisted Pairs UTP versus STP Cable Structure and Categories Twisted-Pair Patch Cable Optical Fibers Advantages Physical Structure Single Mode versus Multimode Fiber Patch Cable LAN Cabling Standards Structured Cabling Background Structured Cabling System Chapter Summary Key Terms Chapter Review Questions Chapter 5: IP Address Planning and Management Introduction Governance of IP Address Space Structure of the IP Address Binary versus Decimal Value Conversion Structure of the IP Address Classful IP: Legacy Class A Network Class B Network Class C Network Classless IP: Today Special IP Address Ranges Loopback Internal Testing of TCP/IP Stack Off-Line Testing of an Application Broadcasting Limited Broadcasting Directed Broadcasting Security Risk of Directed Broadcasting Multicasting Private IP and NAT NAT: One-to-One IP Mapping NAT: Many-to-One IP Mapping Pros and Cons of NAT Subnetting Defining Subnet Boundary (Review) Subnetwork Addressing Subnet Mask Subnet Mask Subnetting Address Space Broadcasting within a Subnet Supernetting Managing IP Address SPACE Determining Number of Nodes Determining Subnets Managing Security with DMZ Subnet Developing IP Assignment Policy Chapter Summary Key Terms Chapter Review Questions Hands-On Exercise: Enterprise IP Management at Atlas Co. Chapter 6: Fundamentals of Packet Routing Introduction Routing Mechanism Routing Table Background Routing Table Elements Packet Forwarding Decision Entry Types of Routing Table Directly Connected Routes Static Routes x Contents Static Routes of a Router Static Routes of a Host Dynamic Routes Dynamic Routing Protocols Protocol Categories Interior Gateway Protocols Exterior Gateway Protocols Delivery of Advertisement Determination of Dynamic Routes Security Management Static versus Dynamic Routing Inter-domain Routing Perspectives on Packet Routing Chapter Summary Key Terms Chapter Review Questions Chapter 7: Ethernet LAN Introduction Standard Layers Ethernet Frame Frame Structure Addressing Modes Ethernet LAN Design Flat versus Hierarchical Design Access Layer Distribution and Core Layers Benefits of Hierarchical Design Spanning Tree Protocol Link Redundancy Protocols and Mechanism Link Aggregation Review Questions Virtual LANs (VLANs) Background: Without VLANs VLAN Concept VLAN Scenarios Without VLANs With VLANs How VLANs Work VLAN ID versus Subnet Addressing VLAN Tagging/Trunking (IEEE802.1Q) Background VLAN Tagging VLAN Tagging/Untagging Process VLAN Types Default VLAN Data VLAN 7.10.2.1 Data VLAN and Security Voice VLAN Inter-VLAN Routing A Router Interface per VLAN Scenario 1 Scenario 2 Sub-Interfaces/Ports (Advanced) VLANS and Network Management Chapter Summary Key Terms Chapter Review Questions Chapter 8: Wireless LAN (WiFi) Introduction Standard Layers and Wireless Cards WiFi Setup Modes Ad Hoc Mode Infrastructure Mode Wireless Access Points AP in Infrastructure Mode AP in Non-infrastructure Modes Repeater Mode Bridge Mode SSID, BSS, and ESS Service Set Identifier BSS versus ESS Basic Service Set Extended Service Set Media Access Control CSMA/CA RTS/CTS WiFi Frames Data Frame Management Frame Control Frame WiFi and Radio Frequency Radio Spectrum Low versus High Radio Frequency Governance Licensed versus Unlicensed Radio WiFi Channels Planning Basic Service Sets Authentication and Association Three-Stage Process Authentication Methods of a Station Open Authentication Pre-shared Key Authentication Authentication Server Additional Notes on Security WiFi Standards 8.10.1 IEEE802.11n Throughput Modes 2.4/5.0 GHz Bands Single-User MIMO QoS Support IEEE802.11ac 5.0 GHz Band Throughput Modes Multi-user MIMO WiFi Mesh Network (IEEE802.11s) WiFi Home/SOHO Network DSL/Cable Modem Wireless Access Router IP Configuration Case: Wireless Access Router Configuration Chapter Summary Key Terms Chapter Review Questions Chapter 9: Wide Area Network Introduction WAN and Enterprise Networks WAN Connection Scenarios Service-Level Agreement CPE versus SPF Demarcation Point WAN Design Considerations Layers of WAN Standards Physical Layer Data Link Layer Circuit Switching Packet Switching Comparison: WAN versus LAN IP Addressing for WAN Links Leased Lines Packet Switched Data Network One Subnet between Two Locations One Subnet for All Locations Physical Layer Options: Leased Lines T-Carrier/E-Carrier T1 and T3 Circuits SONET/SDH Data Link Standard: Leased Lines PPP Frame Structure Router Authentication PAP versus CHAP Data Link Standards: PSDN General Attributes Shared Capacity Customization of Subscribed Speeds Support for Data and Voice Frame Multiplexing Unreliable Transmission Virtual Circuits WAN Switch Table PVC versus SVC Access Link Speeds Frame Relay General Characteristics Frame Structure Data Link Connection Identifier How DLCI Works FR Switch Table Multiple VCs and DLCIs Mapping IP Addresses Asynchronous Transfer Mode Background Cell Switching Quality of Service Carrier Ethernet Background Strengths Service Transport Multi-Protocol Label Switching Labels and Label Information Base Benefits of MPLS Wireless WAN: Cellular Network General Architecture Cell Base Station Mobile Terminal Switching Office Call Channels Multiple Access Technologies Frequency Division Multiple Access Time Division Multiple Access Code Division Multiple Access Orthogonal Frequency Division Multiple Access Generations of Cellular Standards LTE and Future Long-Term Evolution What Does the Future Hold? Chapter Summary Key Terms Chapter Review Questions Chapter 10: The Internet and Client–Server Systems Introduction Internet Architecture Internet Service Provider National ISPs Regional/Local ISPs ISP Network Architecture Internet Exchange Point Autonomous System World Wide Web and Search Engine World Wide Web Deep Web VPN for Secure Communications Technology Background VPN Technology Benefits of VPN Cost-Effectiveness Accessibility and Scalability Flexibility Risks of VPN Reliability Security Types of VPN Remote-Access VPN Site-to-Site VPN VPN Standards IP Security Tunnel Mode Transport Mode Secure Socket Layer Broad Acceptance VPN Implementation SSL and Internet Commerce IPSec versus SSL IPv6 (IP Next Generation) Background IP Packet Structure IP Addressing Subnet Address Bits Host Address Bits Address Abbreviation IPv6 versus IPv4 Standards Transition Approaches Dual IP Stacks within a Node Direct Address Conversion Packet Tunneling Client–Server Applications Domain Name System Domain and Name Resolution Domain Hierarchy DNS Architecture Dynamic Host Configuration Protocol The Process View Server Virtualization Traditional Computing Model Virtualization Concept Virtualization Approaches Hosted Virtualization Hypervisor-Based Virtualization Shared Infrastructure Summary: Benefits Realized Chapter Summary Key Terms Chapter Review Questions Chapter 11: Cybersecurity: Threats Introduction Malicious Codes: Malware Virus Worm Trojan Bot Other Malware Types Malware Issues Password Cracking Brute Force Method Dictionary Method Spoofing Source Address Spoofing IP Spoofing MAC Spoofing Email Spoofing Web (or HTTP) Spoofing Denial of Service Pinging and SYN Requests Pinging SYN Requests Distributed DOS MAC Address Flooding Packet Sniffing Packet Sniffing with Wireshark Port Scanning Port Scanning with Zenmap Social Engineering Man-in-the-Middle MITM with Bogus DHCP Server Spam Poisoning ARP Poisoning (ARP Spoofing) DNS Poisoning (DNS Spoofing) Zero-Day Attack WiFi Threats Wardriving Denial of Service Rogue AP MITM Chapter Summary Key Terms Chapter Review Questions Chapter 12: Cybersecurity: Defenses Introduction Security Requirements and Solutions Security Requirements Confidentiality (Privacy) Data Integrity Authentication Access Control/Authorization Availability Technology Solutions Principles in Architecting Defense Layering Limiting Simplicity Firewall Firewall and DMZ Separating Firewall and Border Router Firewall Functions and Management Firewall Functions Managing Firewall Stateless versus Stateful Filtering Stateless Filtering Stateful Filtering Scenario (XYZ Company) Access Control List How Many ACLs? ACL Filtering versus Packet Routing Cryptography Cryptography System Basic Components How It Works Symmetric-Key Cryptography Asymmetric-Key Cryptography How It Works Pros and Cons Hybrid Approach Hashing Cryptography Digital Signature Digital Certificate Digital Certificate Certificate Authority Security Protocol WiFi Security Standards Wired Equivalent Privacy WiFi Protected Access (WPA and WPA2) Enterprise Mode versus Personal Mode Chapter Summary Key Terms Chapter Review Questions Glossary Acronyms Index


Best Sellers


Product Details
  • ISBN-13: 9781498787970
  • Publisher: Taylor & Francis Inc
  • Publisher Imprint: Productivity Press
  • Height: 254 mm
  • No of Pages: 594
  • Series Title: English
  • Weight: 1300 gr
  • ISBN-10: 1498787975
  • Publisher Date: 12 Jul 2017
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 33 mm
  • Width: 178 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
A Practical Introduction to Enterprise Network and Security Management
Taylor & Francis Inc -
A Practical Introduction to Enterprise Network and Security Management
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

A Practical Introduction to Enterprise Network and Security Management

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA