In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electr
Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking)
โ Scribed by Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi
- Publisher
- Morgan Kaufmann
- Year
- 2007
- Tongue
- English
- Leaves
- 577
- Series
- The Morgan Kaufmann Series in Networking
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks
๐ SIMILAR VOLUMES
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the
Readings in Multimedia Computing and Networking captures the broad areas of research and developments in this burgeoning field, distills the key findings, and makes them accessible to professionals, researchers, and students alike. For the first time, the most influential and innovative papers on th
Readings in Multimedia Computing and Networking captures the broad areas of research and developments in this burgeoning field, distills the key findings, and makes them accessible to professionals, researchers, and students alike. For the first time, the most influential and innovative papers on th
<p><span>Computer Networks: A Systems Approach, Sixth Edition,</span><span> explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and net
<p><span>Computer Networks: A Systems Approach, Sixth Edition,</span><span> explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and net