Huang / MacCallum / Du | Network Security | E-Book | sack.de
E-Book

E-Book, Englisch, 280 Seiten, eBook

Huang / MacCallum / Du Network Security


1. Auflage 2010
ISBN: 978-0-387-73821-5
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 280 Seiten, eBook

ISBN: 978-0-387-73821-5
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark



Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the ?eld of network security. This book contains 11 r- ereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff m- bers from Springer for publishing this work. Besides, we would like to dedicate this book to our families.

Huang / MacCallum / Du Network Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Secure Metering Schemes.- A Cryptographic Framework for the Controlled Release Of Certified Data.- Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions.- Web Forms and Untraceable DDoS Attacks.- Mechanical Verification of Cryptographic Protocols.- Routing Security in Ad Hoc Wireless Networks.- Insider Threat Assessment: Model, Analysis and Tool.- Toward Automated Intrusion Alert Analysis.- Conventional Cryptographic Primitives.- Efficient Trapdoor-Based Client Puzzle Against DoS Attacks.- Attacks and Countermeasures in Sensor Networks: A Survey.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.