A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
From the reviews:
¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS
"Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... ." (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)
* Evolution of network security and lessons learned from history * A fundamental framework for network security * User-level security on demand in ATM networks: a new paradigm * The concept of node status indicator (NSI) and performance analysis * 'Mixed-use' networks * Systematic analysis of vulnerabilities and synthesis of security attack models for ATM networks * Complex vulnerabilities and highly sophisticated attacks * Future issues in network security * Index
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 29,74 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of security on demand through computer modeling and simulation methods. The book presents an . Codice articolo 4189184
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of 'security on demand' through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. 240 pp. Englisch. Codice articolo 9781461265382
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution. Codice articolo 9781461265382
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781461265382_new
Quantità: Più di 20 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 403. Codice articolo C9781461265382
Quantità: Più di 20 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar2716030028045
Quantità: Più di 20 disponibili
Da: dsmbooks, Liverpool, Regno Unito
Paperback. Condizione: Like New. Like New. book. Codice articolo D8F0-0-M-146126538X-6
Quantità: 1 disponibili