Data-Centric Security in Software Defined Networks (SDN)
Marek Amanowicz
Venduto da AHA-BUCH GmbH, Einbeck, Germania
Venditore AbeBooks dal 14 agosto 2006
Nuovi - Rilegato
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloVenduto da AHA-BUCH GmbH, Einbeck, Germania
Venditore AbeBooks dal 14 agosto 2006
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloDruck auf Anfrage Neuware - Printed after ordering - The book focuses on applyingthedata-centric security (DCS)concept and leveraging the unique capabilities of software-defined networks (SDN) to improvethesecurity and resilience of corporate and government information systems used to process critical informationand implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes.Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protectagainst adversaries. However,sophisticated attackers can compromise theperimeter defencesand evenremain inthe systemfor a prolonged time without the ownerbeing aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aimto provide defenceunderthe assumption that the boundary protections will be breached.Based onexperience and lessons learned from research on the application of DCS to defence systems, the authorspresentan approach to integratingthe DCS conceptwithSDN.They introduce a risk-aware approach toroutingin SDN, enabling defence-in-depth and enhanced securityfordata in transit.The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN,thetext includes a short tutorial on using the emulation environment andlinks to the websites from which the software can be downloaded.
Codice articolo 9783031555169
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aimto provide defence under the assumption that the boundary protections will be breached.
Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to integrating the DCS concept with SDN. They introduce a risk-aware approach to routing in SDN, enabling defence-in-depth and enhanced security for data in transit. The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN, the text includes a short tutorial on using the emulation environment and links to the websites from which the software can be downloaded.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aim to provide defence under the assumption that the boundary protections will be breached.
Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to integrating the DCS concept with SDN. They introduce a risk-aware approach to routing in SDN, enabling defence-in-depth and enhanced security for data in transit. The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN, the text includes a short tutorial on using the emulation environment and links to the websites from which the software can be downloaded.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
Termini e condizioni generali e informazioni sul cliente / Informativa sulla privacy
I. Condizioni generali di contratto
§ 1 Disposizioni di base
(1) I seguenti termini e condizioni si applicano a tutti i contratti che l'utente conclude con noi in qualità di fornitore (AHA-BUCH GmbH) tramite le piattaforme Internet AbeBooks e/o ZVAB. Se non diversamente concordato, l'inclusione di uno qualsiasi dei tuoi termini e condizioni da te utilizzati sarà contestata.
(2) Un consumatore ai sensi delle segu...
Spediamo il tuo ordine dopo averlo ricevuto
per articoli a portata di mano entro 24 ore,
per articoli con fornitura notturna entro 48 ore.
Nel caso in cui abbiamo bisogno di ordinare un articolo dal nostro fornitore, il nostro tempo di spedizione dipende dalla data di ricezione degli articoli, ma gli articoli verranno spediti lo stesso giorno.
Il nostro obiettivo è quello di inviare gli articoli ordinati nel modo più veloce, ma anche più efficiente e sicuro ai nostri clienti.
Quantità dell?ordine | Da 2 a 3 giorni lavorativi | Da 2 a 3 giorni lavorativi |
---|---|---|
Primo articolo | EUR 14.99 | EUR 14.99 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.