{"id":361,"date":"2017-07-28T12:32:56","date_gmt":"2017-07-28T10:32:56","guid":{"rendered":"https:\/\/iste.yhello.co\/product\/la-securite-des-reseaux\/"},"modified":"2024-01-03T13:39:35","modified_gmt":"2024-01-03T13:39:35","slug":"la-securite-des-reseaux","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/en\/produit\/la-securite-des-reseaux\/","title":{"rendered":"La s\u00e9curit\u00e9 des r\u00e9seaux"},"content":{"rendered":"<p>Le pr\u00e9judice li\u00e9 au vol d\u2019informations sensibles ou \u00e0 une intrusion dans les syst\u00e8mes informatiques des entreprises et des administrations peut avoir des r\u00e9percussions financi\u00e8res, voire p\u00e9nales. Les organisations ont par cons\u00e9quent l\u2019obligation de se prot\u00e9ger vis-\u00e0-vis des attaques provenant de sources internes et externes.<\/p>\n<p>Cet ouvrage pr\u00e9sente les diff\u00e9rents m\u00e9canismes de s\u00e9curit\u00e9 d\u00e9ploy\u00e9s dans les r\u00e9seaux :<br \/>\n&#8211; les algorithmes cryptographiques qui renforcent la confidentialit\u00e9 des communications ;<br \/>\n&#8211; le m\u00e9canisme 802.1x, utilis\u00e9 pour le contr\u00f4le d&#8217;acc\u00e8s aux r\u00e9seaux Ethernet et Wi-Fi ;<br \/>\n&#8211; le m\u00e9canisme IPSec et les protocoles SSL, TLS et DTLS, qui fournissent des services de confidentialit\u00e9 et permettent d\u2019\u00e9tablir une association de s\u00e9curit\u00e9 et une protection des donn\u00e9es ;<br \/>\n&#8211; le protocole MPLS et les technologies associ\u00e9es servant au cloisonnement du r\u00e9seau ;<br \/>\n&#8211; les pare-feux et les sondes de d\u00e9tection et de pr\u00e9vention d\u2019intrusion IDPS, qui assurent la surveillance des donn\u00e9es.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le pr\u00e9judice li\u00e9 au vol d\u2019informations sensibles ou \u00e0 une intrusion dans les syst\u00e8mes informatiques des entreprises et des administrations peut avoir des r\u00e9percussions financi\u00e8res, voire p\u00e9nales. Les organisations ont par cons\u00e9quent l\u2019obligation de se prot\u00e9ger vis-\u00e0-vis des attaques provenant de sources internes et externes. Cet ouvrage pr\u00e9sente les diff\u00e9rents m\u00e9canismes de s\u00e9curit\u00e9 d\u00e9ploy\u00e9s dans [&hellip;]<\/p>\n","protected":false},"featured_media":362,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[679],"product_tag":[1583,307,1584,1586,1585,31,196,308,1587,608,1588,197,198,199,21,200,22,201,1589,203,204,63,25,172,209,1590,292,212,38,192,145,28,1591,1592,314,1595,1596,1593,1594,253,316,1597,1598,1599],"class_list":{"0":"post-361","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-rseaux-et-tlcommunications-12506534","7":"product_tag-802-1x","8":"product_tag-andre-perez","9":"product_tag-cryptographie","10":"product_tag-detection-dintrusion","11":"product_tag-dtls","12":"product_tag-ebook","13":"product_tag-ebooks","14":"product_tag-ethernet","15":"product_tag-informations-sensibles","16":"product_tag-informatique","17":"product_tag-ipsec","18":"product_tag-iste","19":"product_tag-iste-edition","20":"product_tag-iste-editions","21":"product_tag-iste-group","22":"product_tag-isteedition","23":"product_tag-istegroup","24":"product_tag-kindle","25":"product_tag-la-securite-des-reseaux","26":"product_tag-liseuse","27":"product_tag-livre","28":"product_tag-livre-electronique","29":"product_tag-livre-numerique","30":"product_tag-livre-scientifique","31":"product_tag-livres-scientifiques","32":"product_tag-mpls","33":"product_tag-numerique","34":"product_tag-ouvrage","35":"product_tag-ouvrage-numerique","36":"product_tag-ouvrage-science","37":"product_tag-ouvrage-scientifique","38":"product_tag-ouvrage-scientifique-francais","39":"product_tag-pare-feux","40":"product_tag-perez","41":"product_tag-reseaux","42":"product_tag-securite","43":"product_tag-securite-des-reseaux","44":"product_tag-ssl","45":"product_tag-systemes-informatiques","46":"product_tag-technologie","47":"product_tag-telecommunications","48":"product_tag-tls","49":"product_tag-vpn","50":"product_tag-wpa","52":"first","53":"instock","54":"shipping-taxable","55":"purchasable","56":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La s\u00e9curit\u00e9 des r\u00e9seaux - ISTE Group<\/title>\n<meta name=\"description\" content=\"Les organisations doivent se prot\u00e9ger des attaques de sources internes et externes. L&#039;ouvrage pr\u00e9sente les m\u00e9canismes de s\u00e9curit\u00e9 des r\u00e9seaux.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La s\u00e9curit\u00e9 des r\u00e9seaux - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Les organisations doivent se prot\u00e9ger des attaques de sources internes et externes. L&#039;ouvrage pr\u00e9sente les m\u00e9canismes de s\u00e9curit\u00e9 des r\u00e9seaux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T13:39:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/\",\"url\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/\",\"name\":\"La s\u00e9curit\u00e9 des r\u00e9seaux - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg\",\"datePublished\":\"2017-07-28T10:32:56+00:00\",\"dateModified\":\"2024-01-03T13:39:35+00:00\",\"description\":\"Les organisations doivent se prot\u00e9ger des attaques de sources internes et externes. L'ouvrage pr\u00e9sente les m\u00e9canismes de s\u00e9curit\u00e9 des r\u00e9seaux.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg\",\"width\":300,\"height\":450,\"caption\":\"La s\u00e9curit\u00e9 des r\u00e9seaux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"La s\u00e9curit\u00e9 des r\u00e9seaux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"Publishing Knowledge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La s\u00e9curit\u00e9 des r\u00e9seaux - ISTE Group","description":"Les organisations doivent se prot\u00e9ger des attaques de sources internes et externes. L'ouvrage pr\u00e9sente les m\u00e9canismes de s\u00e9curit\u00e9 des r\u00e9seaux.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/","og_locale":"en_US","og_type":"article","og_title":"La s\u00e9curit\u00e9 des r\u00e9seaux - ISTE Group","og_description":"Les organisations doivent se prot\u00e9ger des attaques de sources internes et externes. L'ouvrage pr\u00e9sente les m\u00e9canismes de s\u00e9curit\u00e9 des r\u00e9seaux.","og_url":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T13:39:35+00:00","og_image":[{"width":300,"height":450,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/","url":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/","name":"La s\u00e9curit\u00e9 des r\u00e9seaux - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg","datePublished":"2017-07-28T10:32:56+00:00","dateModified":"2024-01-03T13:39:35+00:00","description":"Les organisations doivent se prot\u00e9ger des attaques de sources internes et externes. L'ouvrage pr\u00e9sente les m\u00e9canismes de s\u00e9curit\u00e9 des r\u00e9seaux.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/939571961_332103329-1.jpg","width":300,"height":450,"caption":"La s\u00e9curit\u00e9 des r\u00e9seaux"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/fr\/produit\/la-securite-des-reseaux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"La s\u00e9curit\u00e9 des r\u00e9seaux"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"Publishing Knowledge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media\/362"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media?parent=361"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_brand?post=361"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_cat?post=361"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_tag?post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}