Skip to content
Skip to main content

About this free course

Become an OU student

Download this course

Share this free course

Network security
Network security

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Acknowledgements

The content acknowledged below is Proprietary (see terms and conditions [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] ) and is used under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence .

Grateful acknowledgement is made to the following sources for permission to reproduce material within this unit:

Figure 1, accessed 8 February 2007. Figure 2 based on Stallings, W., SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, 3rd edition, May 2001, Addison Wesley; Figures 7 and 8 based on Schneier, B. (1996) Applied Cryptography, 2nd edition, John Wiley & Sons; Figure 9 based on King, T. and Newson, D. (1999) Data Network Engineering, Kluwer; Figure 10 based on Stallings, W (1995) Cryptography and Network Security, Prentice Hall.

Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.

Don't miss out:

If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University - www.open.edu/ openlearn/ free-courses