Wireless mobile internet security


Man Young Rhee.
Bok Engelsk 2013 Man Young. Rhee,· Electronic books.
Utgitt
Hoboken : : Wiley, , 2013.
Omfang
1 online resource (523 p.)
Utgave
2nd ed.
Opplysninger
Description based upon print version of record.. - Cover; Title Page; Copyright; Contents; Preface; About the Author; Acknowledgments; Chapter 1 Internet working and Layered Models; 1.1 Networking Technology; 1.1.1 Local Area Networks (LANs); 1.1.2 Wide Area Networks (WANs); 1.2 Connecting Devices; 1.2.1 Switches; 1.2.2 Repeaters; 1.2.3 Bridges; 1.2.4 Routers; 1.2.5 Gateways; 1.3 The OSI Model; 1.4 TCP/IP Model; 1.4.1 Network Access Layer; 1.4.2 Internet Layer; 1.4.3 Transport Layer; 1.4.4 Application Layer; Chapter 2 TCP/IP Suite and Internet Stack Protocols; 2.1 Network Layer Protocols; 2.1.1 Internet Protocol (IP). - 2.1.2 Address Resolution Protocol (ARP)2.1.3 Reverse Address Resolution Protocol (RARP); 2.1.4 Classless Interdomain Routing (CIDR); 2.1.5 IP Version 6 (IPv6 or IPng); 2.1.6 Internet Control Message Protocol (ICMP); 2.1.7 Internet Group Management Protocol (IGMP); 2.2 Transport Layer Protocols; 2.2.1 Transmission Control Protocol (TCP); 2.2.2 User Datagram Protocol (UDP); 2.3 World Wide Web; 2.3.1 Hypertext Transfer Protocol (HTTP); 2.3.2 Hypertext Markup Language (HTML); 2.3.3 Common Gateway Interface (CGI); 2.3.4 Java; 2.4 File Transfer; 2.4.1 File Transfer Protocol (FTP). - 2.4.2 Trivial File Transfer Protocol (TFTP)2.4.3 Network File System (NFS); 2.5 E-Mail; 2.5.1 Simple Mail Transfer Protocol (SMTP); 2.5.2 Post Office Protocol Version 3 (POP3); 2.5.3 Internet Message Access Protocol (IMAP); 2.5.4 Multipurpose Internet Mail Extension (MIME); 2.6 Network Management Service; 2.6.1 Simple Network Management Protocol (SNMP); 2.7 Converting IP Addresses; 2.7.1 Domain Name System (DNS); 2.8 Routing Protocols; 2.8.1 Routing Information Protocol (RIP); 2.8.2 Open Shortest Path First (OSPF); 2.8.3 Border Gateway Protocol (BGP); 2.9 Remote System Programs; 2.9.1 TELNET. - 2.9.2 Remote Login (Rlogin)2.10 Social Networking Services; 2.10.1 Facebook; 2.10.2 Twitter; 2.10.3 Linkedin; 2.10.4 Groupon; 2.11 Smart IT Devices; 2.11.1 Smartphones; 2.11.2 Smart TV; 2.11.3 Video Game Console; 2.12 Network Security Threats; 2.12.1 Worm; 2.12.2 Virus; 2.12.3 DDoS; 2.13 Internet Security Threats; 2.13.1 Phishing; 2.13.2 SNS Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password Cracking; 2.14.3 Rootkit; 2.14.4 Trojan Horse; 2.14.5 Keylogging; 2.14.6 Spoofing Attack; 2.14.7 Packet Sniffer; 2.14.8 Session Hijacking. - 3.3.1 ECSD (Enhanced Circuit-Switched Data). - Chapter 3 Global Trend of Mobile Wireless Technology3.1 1G Cellular Technology; 3.1.1 AMPS (Advanced Mobile Phone System); 3.1.2 NMT (Nordic Mobile Telephone); 3.1.3 TACS (Total Access Communications System); 3.2 2G Mobile Radio Technology; 3.2.1 CDPD (Cellular Digital Packet Data), North American Protocol; 3.2.2 GSM (Global System for Mobile Communications); 3.2.3 TDMA-136 or IS-54; 3.2.4 iDEN (Integrated Digital Enhanced Network); 3.2.5 cdmaOne IS-95A; 3.2.6 PDC (Personal Digital Cellular); 3.2.7 i-mode; 3.2.8 WAP (Wireless Application Protocol); 3.3 2.5G Mobile Radio Technology. - The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies
Emner
Wireless Internet - Security measures.
datasikkerhet sikkerhet mobil trådløs
Sjanger
Dewey
ISBN
9781118496534

Bibliotek som har denne