The content acknowledged below is Proprietary (see Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence.) and is used under a
Grateful acknowledgement is made to the following sources for permission to reproduce material within this unit:
Figure 1, accessed 8 February 2007. Figure 2 based on Stallings, W., SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, 3rd edition, May 2001, Addison Wesley; Figures 7 and 8 based on Schneier, B. (1996) Applied Cryptography, 2nd edition, John Wiley & Sons; Figure 9 based on King, T. and Newson, D. (1999) Data Network Engineering, Kluwer; Figure 10 based on Stallings, W (1995) Cryptography and Network Security, Prentice Hall.
Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.
Don't miss out:
If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University - www.open.edu/ openlearn/ free-courses