By Christos Douligeris, Dimitrios N. Serpanos
A different evaluate of community safeguard concerns, suggestions, and methodologies at an architectural and study level
Network safeguard offers the newest examine and addresses most probably destiny advancements in community defense protocols, architectures, coverage, and implementations. It covers a variety of subject matters facing community safeguard, together with safe routing, designing firewalls, cellular agent defense, Bluetooth safeguard, instant sensor networks, securing electronic content material, and lots more and plenty more.
Leading gurus within the box offer trustworthy info at the present nation of defense protocols, architectures, implementations, and regulations. participants study learn actions, proposals, developments, and state of the art points of safeguard and supply specialist insights into the way forward for the industry.
Complete with thoughts for enforcing safeguard mechanisms and methods, community defense features:
• state of the art applied sciences now not lined in different books, corresponding to Denial of provider (DoS) and disbursed Denial-of-Service (DDoS) assaults and countermeasures
• difficulties and options for a variety of community applied sciences, from fastened aspect to mobile
• Methodologies for real-time and non-real-time functions and protocols
Read or Download Network Security: Current Status and Future Directions PDF
Similar network security books
IPSec, moment version is the main authoritative, complete, obtainable, and updated consultant to IPSec know-how. top gurus conceal all elements of IPSec structure, implementation, and deployment; assessment very important technical advances on the grounds that IPSec was once first standardized; and current new case experiences demonstrating end-to-end IPSec safeguard.
SpringerBriefs current concise summaries of state-of-the-art examine and useful functions throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers a number of content material from expert to educational. Briefs let authors to give their rules and readers to soak up them with minimum time funding.
Unified Communications Forensics: Anatomy of universal UC assaults is the 1st booklet to give an explanation for the problems and vulnerabilities and exhibit the assaults, forensic artifacts, and countermeasures required to set up a safe (UC) surroundings. This e-book is written through prime UC specialists Nicholas provide and Joseph W.
Community protection is a truly advanced company. The Cisco snap shots Firewall plays a few very particular services as a part of the safety technique. it is important to to be acquainted with many networking and community protection thoughts ahead of you adopt the CSPFA certification. This ebook is designed for protection execs or networking pros who're drawn to starting the safety certification method.
- Configuring Check Point NGX VPN-1 Firewall-1
- How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN
- Hiding in Plain Sight : Steganography and the Art of Covert Communication
- Computer Security Handbook, Set
- Information Security Management Handbook, Sixth Edition
Additional info for Network Security: Current Status and Future Directions
REFERENCES 1. A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997. 2. International Organization for Standardization (ISO), Information Processing Systems—Open Systems Interconnection—Part 2: Security Architecture, ISO/IEC 7498-2, ISO, Geneva, 1989. 3. 800, ITU, Geneva, 1991. 4. T. R. Peltier, Information Security Risk Analysis, Auerbach Publications, New York, 2001. 5. International Organization for Standardization (ISO), Information Processin g Systems—Open Systems Interconnection—Part 1: Basic Reference Model, ISO/IEC 7498-1, ISO, 1984, also ISO/OSI 7498-1, Geneva, 1994.
Security in speciﬁc network services such as IP Multicast and Voice over IP are analyzed in Chapters 12 and 13, respectively. Furthermore, Chapter 14 discusses the vulnerabilities and the security measures for Grids. Finally, Chapter 15 discusses security issues of mobile code used in networking, such as mobile agent security mechanisms. These are mainly used in another case of specialpurpose networks, mainly intelligent networks. Wireless networks, in general, have special security needs which are not always covered by the traditional network security mechanisms for several reasons, such as the difference in the access medium and the efﬁciency requirements.
Work on the latter threat model started recently. We will ﬁrst give a brief introduction to networking technologies, followed by a description of attacks that the adversary may mount with the goal of disrupting the packet delivery service. We will subsequently describe possible countermeasures against these attacks. We will cover protection mechanisms of different networking technologies so as Network Security: Current Status and Future Directions, Edited by C. Douligeris and D. N. Serpanos Copyright © 2007 the Institute of Electrical and Electronics Engineers, Inc.