|Listed in category:
Have one to sell?

Introduction to Computer Networks and Cybersecurity

Goodwill of North Georgia
(7239)
Registered as a business seller
US $15.50
Approximately£11.53
Condition:
New
Breathe easy. Returns accepted.
Postage:
Free USPS Media MailTM.
Located in: Norcross, Georgia, United States
Delivery:
Estimated between Thu, 31 Jul and Wed, 6 Aug to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the delivery service selected, the seller's delivery history and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:365622241320
Last updated on 28 Jul, 2025 19:33:48 BSTView all revisionsView all revisions

Item specifics

Condition
New: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
Release Year
2013
Book Title
Introduction to Computer Networks and Cybersecurity
ISBN
9781466572133

About this product

Product Identifiers

Publisher
Taylor & Francis Group
ISBN-10
1466572132
ISBN-13
9781466572133
eBay Product ID (ePID)
117287279

Product Key Features

Number of Pages
1336 Pages
Language
English
Publication Name
Introduction to Computer Networks and Cybersecurity
Subject
Networking / General, Security / General, Security / Networking, Information Technology
Publication Year
2013
Type
Textbook
Subject Area
Computers
Author
J. David Irwin, Chwan-Hwa (John) Wu
Format
Hardcover

Dimensions

Item Height
2.2 in
Item Weight
111.5 Oz
Item Length
11.4 in
Item Width
8.7 in

Additional Product Features

Intended Audience
College Audience
LCCN
2012-036920
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
An Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. Emerging Technologies: Network and Information Infrastructure Virtualization. Unified Communications and Multimedia Protocols. Glossary of Acronyms. Index.
Synopsis
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks--and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint(R) animations, are available to instructors with qualifying course adoption., If a network is not secure, how valuable is it? A guide to computer networks and cybersecurity, this book highlights the interconnections between the two to demystify the complexities of designing secure modern networks. The book walks users through the fundamentals of networks, from an overview of Internet architecture through the protocol layers. It then delves into cybersecurity, covering both attack and defense techniques, and closes with a look at the emerging technologies that will alter the current state of multimedia communication and data center/cloud computing.
LC Classification Number
TK5105.59

Item description from the seller

Seller business information

About this seller

Goodwill of North Georgia

99% positive Feedback29K items sold

Joined Feb 2019
Registered as a business seller
At Goodwill of North Georgia, our mission is to put people to work. We ve embraced the philosophy of “a hand up, not a hand out” since 1925. Our belief is, when people go to work, it improves lives, ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
5.0
Reasonable postage cost
5.0
Delivery time
5.0
Communication
5.0

Seller Feedback (7,613)

All ratings
Positive
Neutral
Negative
  • a***i (13881)- Feedback left by buyer.
    Past month
    Verified purchase
    Exceptionally Positive Experience Buying From This Seller, Exemplary Fast Early Delivery, Perfect packing job, Exactly as Described, Great Customer Communication and Service, EXCELLENT TRANSACTION, Fair Prices, Highly Recommend Buying From This Seller!!! YOUR the BEST seller on e-Bay
  • 4***o (634)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Book is in very good condition, as advertized, looks very clean, no markings or highlighting. Shipped next day, packaged very well, much better than Amazon these days. Good price, i always try to buy from Goodwill before other sellers and have never been disappointed. Thanks.
  • g***a (2075)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    The book arrived in good condition well packed and exactly as represented by the seller. A good value for the price. I would definitely patronize this seller again for similar items in the future.