Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Person/Organisation
Fachgebiete(RVK)
Zugriff
  • 1
    Online-Ressource
    Online-Ressource
    Amsterdam ; : Morgan Kaufmann/Elsevier,
    UID:
    almafu_9960072686602883
    Umfang: 1 online resource (365 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-71377-5 , 9786611713775 , 0-08-056015-6
    Inhalt: Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.* Chapters contributed by recognized
    Anmerkung: Description based upon print version of record. , Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan , 3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol , 5.7 Hashing and Encryption: Algorithms and Keys5.8 Exchanging Keys; Further Reading; CHAPTER 6 IP Security in Practice; 6.1 IP Security Issues; 6.2 Security Goals; 6.3 Encryption and Authentication Algorithms; 6.4 IPsec: The Protocols; 6.5 IP and IPsec; 6.6 Implementing and Deploying IPsec; 6.7 Conclusion; CHAPTER 7 Security in Wireless Systems; 7.1 Introduction; 7.2 Security and Privacy Needs of a Wireless System; 7.3 Required Features for a Secured Wireless Communications System; 7.4 Methods of Providing Privacy and Security in Wireless Systems; 7.5 Wireless Security and Standards , 7.6 IEEE 802.11 Security7.7 Security in North American Cellular/PCS Systems; 7.8 Security in GSM, GPRS, and UMTS; 7.9 Data Security; 7.10 Air Interface Support for Authentication Methods; 7.11 Summary of Security in Current Wireless Systems; 7.12 Conclusion; References; CHAPTER 8 Mobile Security and Privacy; 8.1 Security Primer; 8.2 Cellular Network Security; 8.3 Wireless LAN Security; 8.4 Bluetooth Security; 8.5 Ad Hoc Network Security; 8.6 Mobile Privacy; 8.7 Conclusion; Further Reading; References; CHAPTER 9 Optical Network Survivability; 9.1 Basic Concepts; 9.2 Protection in SONET/SDH , 9.3 Protection in IP Networks9.4 Why Optical Layer Protection; 9.5 Optical Layer Protection Schemes; 9.6 Interworking between Layers; 9.7 Conclusion; Further Reading; References; CHAPTER 10 Intrusion Response Systems: A Survey; 10.1 Introduction; 10.2 Static Decision-Making Systems; 10.3 Dynamic Decision-Making Systems; 10.4 Intrusion Tolerance through Diverse Replicas; 10.5 Responses to Specific Kinds of Attacks; 10.6 Benchmarking Intrusion Response Systems; 10.7 Thoughts on Evolution of IRS Technology; 10.8 Conclusion; References; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T , U , English
    Weitere Ausg.: ISBN 0-12-374463-6
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Burlington, MA, USA : Morgan Kaufmann
    UID:
    gbv_1656114348
    Umfang: Online Ressource (1 v.)
    Ausgabe: Online-Ausg.
    ISBN: 9780123744630 , 0123744636
    Inhalt: Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp
    Inhalt: Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension
    Anmerkung: Includes bibliographical references and index. - Description based on print version record , Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan , 3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol , 5.7 Hashing and Encryption: Algorithms and Keys5.8 Exchanging Keys; Further Reading; CHAPTER 6 IP Security in Practice; 6.1 IP Security Issues; 6.2 Security Goals; 6.3 Encryption and Authentication Algorithms; 6.4 IPsec: The Protocols; 6.5 IP and IPsec; 6.6 Implementing and Deploying IPsec; 6.7 Conclusion; CHAPTER 7 Security in Wireless Systems; 7.1 Introduction; 7.2 Security and Privacy Needs of a Wireless System; 7.3 Required Features for a Secured Wireless Communications System; 7.4 Methods of Providing Privacy and Security in Wireless Systems; 7.5 Wireless Security and Standards , 7.6 IEEE 802.11 Security7.7 Security in North American Cellular/PCS Systems; 7.8 Security in GSM, GPRS, and UMTS; 7.9 Data Security; 7.10 Air Interface Support for Authentication Methods; 7.11 Summary of Security in Current Wireless Systems; 7.12 Conclusion; References; CHAPTER 8 Mobile Security and Privacy; 8.1 Security Primer; 8.2 Cellular Network Security; 8.3 Wireless LAN Security; 8.4 Bluetooth Security; 8.5 Ad Hoc Network Security; 8.6 Mobile Privacy; 8.7 Conclusion; Further Reading; References; CHAPTER 9 Optical Network Survivability; 9.1 Basic Concepts; 9.2 Protection in SONET/SDH , 9.3 Protection in IP Networks9.4 Why Optical Layer Protection; 9.5 Optical Layer Protection Schemes; 9.6 Interworking between Layers; 9.7 Conclusion; Further Reading; References; CHAPTER 10 Intrusion Response Systems: A Survey; 10.1 Introduction; 10.2 Static Decision-Making Systems; 10.3 Dynamic Decision-Making Systems; 10.4 Intrusion Tolerance through Diverse Replicas; 10.5 Responses to Specific Kinds of Attacks; 10.6 Benchmarking Intrusion Response Systems; 10.7 Thoughts on Evolution of IRS Technology; 10.8 Conclusion; References; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T; U
    Weitere Ausg.: ISBN 0123744636
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Network security Burlington, MA, USA : Morgan Kaufmann, c2008
    Sprache: Englisch
    Schlagwort(e): Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Buch
    Buch
    Amsterdam [u.a.] : Morgan Kaufmann/Elsevier
    UID:
    b3kat_BV035194825
    Umfang: XIII, 350 S. , Ill., graph. Darst. , 25 cm
    ISBN: 9780123744630 , 0123744636
    Anmerkung: Includes bibliographical references and index
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Rechnernetz ; Computersicherheit
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 0123744601?
Meinten Sie 0121794636?
Meinten Sie 0123742676?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz