Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Infrastructure Security

Buy
Network Infrastructure Security, 9781441901651 (1441901655), Springer, 2009
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.

Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field.

Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.

About the authors

Angus Kin-Yeung Wong obtained his BSc and PhD degrees from City University of Hong Kong and is currently an associate professor at Macao Polytechnic Institute. Alan Kai-Hau Yeung obtained his BSc and PhD degrees from the Chinese University of Hong Kong and is currently an associate professor at City University of Hong Kong. Wong and Yeung have been collaborating in network-related research for over 10 years.

(HTML tags aren't allowed.)

Microsoft Dynamics CRM 2011 Unleashed
Microsoft Dynamics CRM 2011 Unleashed

Microsoft® Dynamics CRM 2011 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, managing, and securing the newest version of Dynamics CRM. Authored by three leading Microsoft Dynamics implementers, it illuminates new opportunities to deploy CRM as a hosted service (SaaS), integrate with...

The Unofficial Guide Walt Disney World 2011 (Unofficial Guides)
The Unofficial Guide Walt Disney World 2011 (Unofficial Guides)

THE AUTHORS AND RESEARCHERS of this guide specifically and categorically declare that they are and always have been totally independent of the Walt Disney Company, Inc.; of Disneyland, Inc.; of Walt Disney World, Inc.; and of any and all other members of the Disney corporate family not listed.

The material in this guide originated...

Vietnam at War
Vietnam at War
For many Westerners, the Vietnam War summons images of American soldiers patrolling rice paddies, battling an elusive enemy as helicopters circle overhead. But there were, in fact, many Vietnam wars--an anti-colonial war with France, a cold war turned hot with the United States, a civil war between North and South Vietnam and among southern...

Sams Teach Yourself SQL in 10 Minutes, Third Edition
Sams Teach Yourself SQL in 10 Minutes, Third Edition

Sams Teach Yourself SQL in 10 Minutes has established itself as the gold standard for introductory SQL books, offering a fast-paced accessible tutorial to the major themes and techniques involved in applying the SQL language. Forta's examples are clear and his writing style is crisp and concise. As with earlier editions, this revision includes...

Online Investing Hacks : 100 Industrial-Strength Tips & Tools
Online Investing Hacks : 100 Industrial-Strength Tips & Tools
Individual investors have become more computer-literate and technology-dependent than ever before. Whether you're looking for suitable investments, studying alternatives, or managing your portfolios, you need data. The Internet can be a goldmine of financial data and research, but today's online investors also use spreadsheets, databases,...
Theory of Finite Automata With an Introduction to Formal Languages
Theory of Finite Automata With an Introduction to Formal Languages
It often seems that mathematicians regularly provide answers well before the rest of the world finds reasons to ask the questions. The operation of the networks of relays used in the first computers is exactly described by Boolean functions. George Boole thereby made his contribution to computer science in the mid-1800s, and Boolean algebra is used...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy