feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann/Elsevier,
    UID:
    almahu_9949697928002882
    Format: 1 online resource (365 p.)
    Edition: 1st edition
    ISBN: 1-281-71377-5 , 9786611713775 , 0-08-056015-6
    Content: Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.* Chapters contributed by recognized
    Note: Description based upon print version of record. , Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan , 3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol , 5.7 Hashing and Encryption: Algorithms and Keys5.8 Exchanging Keys; Further Reading; CHAPTER 6 IP Security in Practice; 6.1 IP Security Issues; 6.2 Security Goals; 6.3 Encryption and Authentication Algorithms; 6.4 IPsec: The Protocols; 6.5 IP and IPsec; 6.6 Implementing and Deploying IPsec; 6.7 Conclusion; CHAPTER 7 Security in Wireless Systems; 7.1 Introduction; 7.2 Security and Privacy Needs of a Wireless System; 7.3 Required Features for a Secured Wireless Communications System; 7.4 Methods of Providing Privacy and Security in Wireless Systems; 7.5 Wireless Security and Standards , 7.6 IEEE 802.11 Security7.7 Security in North American Cellular/PCS Systems; 7.8 Security in GSM, GPRS, and UMTS; 7.9 Data Security; 7.10 Air Interface Support for Authentication Methods; 7.11 Summary of Security in Current Wireless Systems; 7.12 Conclusion; References; CHAPTER 8 Mobile Security and Privacy; 8.1 Security Primer; 8.2 Cellular Network Security; 8.3 Wireless LAN Security; 8.4 Bluetooth Security; 8.5 Ad Hoc Network Security; 8.6 Mobile Privacy; 8.7 Conclusion; Further Reading; References; CHAPTER 9 Optical Network Survivability; 9.1 Basic Concepts; 9.2 Protection in SONET/SDH , 9.3 Protection in IP Networks9.4 Why Optical Layer Protection; 9.5 Optical Layer Protection Schemes; 9.6 Interworking between Layers; 9.7 Conclusion; Further Reading; References; CHAPTER 10 Intrusion Response Systems: A Survey; 10.1 Introduction; 10.2 Static Decision-Making Systems; 10.3 Dynamic Decision-Making Systems; 10.4 Intrusion Tolerance through Diverse Replicas; 10.5 Responses to Specific Kinds of Attacks; 10.6 Benchmarking Intrusion Response Systems; 10.7 Thoughts on Evolution of IRS Technology; 10.8 Conclusion; References; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T , U , English
    Additional Edition: ISBN 0-12-374463-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV046062493
    Format: 1 Online-Ressource (x, 221 Seiten) , 84 Illustrationen, 66 in Farbe
    ISBN: 9783030234041
    Series Statement: Lecture notes in computer science 11521
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-23403-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-23405-8
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Amsterdam [u.a.] : Morgan Kaufmann/Elsevier
    UID:
    b3kat_BV035194825
    Format: XIII, 350 S. , Ill., graph. Darst. , 25 cm
    ISBN: 9780123744630 , 0123744636
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Computersicherheit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Burlington, MA, USA : Morgan Kaufmann
    UID:
    gbv_1656114348
    Format: Online Ressource (1 v.)
    Edition: Online-Ausg.
    ISBN: 9780123744630 , 0123744636
    Content: Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp
    Content: Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension
    Note: Includes bibliographical references and index. - Description based on print version record , Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan , 3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol , 5.7 Hashing and Encryption: Algorithms and Keys5.8 Exchanging Keys; Further Reading; CHAPTER 6 IP Security in Practice; 6.1 IP Security Issues; 6.2 Security Goals; 6.3 Encryption and Authentication Algorithms; 6.4 IPsec: The Protocols; 6.5 IP and IPsec; 6.6 Implementing and Deploying IPsec; 6.7 Conclusion; CHAPTER 7 Security in Wireless Systems; 7.1 Introduction; 7.2 Security and Privacy Needs of a Wireless System; 7.3 Required Features for a Secured Wireless Communications System; 7.4 Methods of Providing Privacy and Security in Wireless Systems; 7.5 Wireless Security and Standards , 7.6 IEEE 802.11 Security7.7 Security in North American Cellular/PCS Systems; 7.8 Security in GSM, GPRS, and UMTS; 7.9 Data Security; 7.10 Air Interface Support for Authentication Methods; 7.11 Summary of Security in Current Wireless Systems; 7.12 Conclusion; References; CHAPTER 8 Mobile Security and Privacy; 8.1 Security Primer; 8.2 Cellular Network Security; 8.3 Wireless LAN Security; 8.4 Bluetooth Security; 8.5 Ad Hoc Network Security; 8.6 Mobile Privacy; 8.7 Conclusion; Further Reading; References; CHAPTER 9 Optical Network Survivability; 9.1 Basic Concepts; 9.2 Protection in SONET/SDH , 9.3 Protection in IP Networks9.4 Why Optical Layer Protection; 9.5 Optical Layer Protection Schemes; 9.6 Interworking between Layers; 9.7 Conclusion; Further Reading; References; CHAPTER 10 Intrusion Response Systems: A Survey; 10.1 Introduction; 10.2 Static Decision-Making Systems; 10.3 Dynamic Decision-Making Systems; 10.4 Intrusion Tolerance through Diverse Replicas; 10.5 Responses to Specific Kinds of Attacks; 10.6 Benchmarking Intrusion Response Systems; 10.7 Thoughts on Evolution of IRS Technology; 10.8 Conclusion; References; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T; U
    Additional Edition: ISBN 0123744636
    Additional Edition: Erscheint auch als Druck-Ausgabe Network security Burlington, MA, USA : Morgan Kaufmann, c2008
    Language: English
    Keywords: Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV046060948
    Format: x, 219 Seiten , Illustrationen, Diagramme
    ISBN: 9783030234034
    Series Statement: Lecture notes in computer science 11521
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-030-23404-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9948126399202882
    Format: X, 221 p. 84 illus., 66 illus. in color. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9783030234041
    Series Statement: Security and Cryptology ; 11521
    Content: This book constitutes the refereed proceedings of the Second International Conference on Blockchain, ICBC 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019. The 13 full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in blockchain technologies, platforms, solutions and business models such as new blockchain architecture, platform constructions, blockchain development and blockchain services technologies, as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.
    Note: Blockchain: an empirical investigation of its scope for improvement -- Establishing Standards for Consensus on Blockchains -- An Experimental Evaluation of BFT Protocols for Blockchains -- Layered Consensus Mechanism in Consortium Blockchain for Enterprise Services -- Digital-Physical Parity for Food Fraud Detection -- Blockchain Interoperable Digital Objects -- Patient Privacy and Ownership of Electronic Health Records on a Blockchain -- Blockchain Federation for Complex Distributed Applications -- Enriching Smart Contracts with Temporal Aspects -- CloudAgora: Democratizing the Cloud -- Dual Token Blockchain Economy Framework, The Garment Use case -- Performance Benchmarking and Optimization for Blockchain: A Survey -- Developing a Vehicle Networking Platform based on Blockchain Technology -- Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone -- Performance Evaluation of Hyperledger Fabric with Malicious Behavior. .
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030234034
    Additional Edition: Printed edition: ISBN 9783030234058
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948698168002882
    Format: 1 online resource (735 pages)
    ISBN: 1-4799-1050-3
    Note: Includes index.
    Additional Edition: ISBN 1-4799-2669-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_772436010
    Format: Online-Ressource (1 online resource (204 pages))
    Edition: Association for Computing Machinery-Digital Library
    ISBN: 9781450300490
    Series Statement: ACM Digital Library
    Note: Title from The ACM Digital Library
    Language: English
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_1668642425
    Format: 1 Online-Ressource (X, 221 p. 84 illus., 66 illus. in color)
    Edition: 1st ed. 2019
    ISBN: 9783030234041
    Series Statement: Security and Cryptology 11521
    Content: Blockchain: an empirical investigation of its scope for improvement -- Establishing Standards for Consensus on Blockchains -- An Experimental Evaluation of BFT Protocols for Blockchains -- Layered Consensus Mechanism in Consortium Blockchain for Enterprise Services -- Digital-Physical Parity for Food Fraud Detection -- Blockchain Interoperable Digital Objects -- Patient Privacy and Ownership of Electronic Health Records on a Blockchain -- Blockchain Federation for Complex Distributed Applications -- Enriching Smart Contracts with Temporal Aspects -- CloudAgora: Democratizing the Cloud -- Dual Token Blockchain Economy Framework, The Garment Use case -- Performance Benchmarking and Optimization for Blockchain: A Survey -- Developing a Vehicle Networking Platform based on Blockchain Technology -- Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone -- Performance Evaluation of Hyperledger Fabric with Malicious Behavior
    Content: This book constitutes the refereed proceedings of the Second International Conference on Blockchain, ICBC 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019. The 13 full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in blockchain technologies, platforms, solutions and business models such as new blockchain architecture, platform constructions, blockchain development and blockchain services technologies, as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management
    Additional Edition: ISBN 9783030234034
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-23403-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_88481842X
    Format: 1 Online-Ressource , Illustrationen
    ISBN: 9781467390057
    Note: Literaturangaben , Enthält Beiträge von 26 Workshops , Konferenzdatum auf Titelseite fälschlich als "Dec 05-Dec 08, 2015" angegeben , Richtiges Konferenzdatum: "Dec 05-Dec 08, 2016"
    Additional Edition: ISBN 9781467390040
    Additional Edition: ISBN 9781467390064
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages