Network Security: Current Status and Future Directions
- Publisher
- Wiley-IEEE Press
- Year
- 2007
- Tongue
- English
- Leaves
- 569
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
A unique overview of network security issues, solutions, and methodologies at an architectural and research level
Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more.
Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry.
Complete with strategies for implementing security mechanisms and techniques, Network Security features:
State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures
Problems and solutions for a wide range of network technologies, from fixed point to mobile
*
Methodologies for real-time and non-real-time applications and protocolsContent:
Chapter 1 Computer Network Security: Basic Background and Current Issues (pages 1โ12): Panayiotis Kotzanikolaou and Dr. Christos Douligeris
Chapter 2 Secure Routing (pages 15โ32): Ioannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy and Dr. Randy Wang
Chapter 3 Designing Firewalls: A Survey (pages 33โ49): Angelos D. Keromytis and Vassilis Prevelakis
Chapter 4 Security in Virtual Private Networks (pages 51โ63): Dr. Srinivas Sampalli
Chapter 5 IP Security (IPSec) (pages 65โ82): Anirban Chakrabarti and Manimaran Govindarasu
Chapter 6 IDS for Networks (pages 83โ97): John C. McEachen and John M. Zachary
Chapter 7 Intrusion Detection Versus Intrusion Protection (pages 99โ115): Luis Sousa Cardoso
Chapter 8 Denial?of?Service Attacks (pages 117โ134): Aikaterini Mitrokotsa and Christos Douligeris
Chapter 9 Secure Architectures with Active Networks (pages 135โ151): Dr. Srinivas Sampalli, Yaser Haggag and Christian Labonte
Chapter 10 Security in E?Services and Applications (pages 157โ177): Manish Mehta, Sachin Singh and Yugyung Lee
Chapter 11 Security in Web Services (pages 179โ204): Christos Douligeris and Dr. George P. Ninios
Chapter 12 Secure Multicasting (pages 205โ227): Dr. Constantinos Boukouvalas and Anthony G. Petropoulos
Chapter 13 Voice Over IP Security (pages 229โ245): Son Vuong and Kapil Kumar Singh
Chapter 14 Grid Security (pages 247โ256): Kyriakos Stefanidis, Artemios G. Voyiatzis and Dr. Dimitrios N. Serpanos
Chapter 15 Mobile Agent Security (pages 257โ269): Panayiotis Kotzanikolaou, Dr. Christos Douligeris, Rosa Mavropodi and Vassilios Chrissikopoulos
Chapter 16 Mobile Terminal Security (pages 275โ296): Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stephane Socie and Claire Whelan
Chapter 17 IEEE 802.11 Security (pages 297โ312): Daniel L. Lough, David J. Robinson and Ian G. Schneller
Chapter 18 Bluetooth Security (pages 313โ329): Christian Gehrmann
Chapter 19 Mobile Telecom Networks (pages 331โ353): Christos Xenakis and Lazaros Merakos
Chapter 20 Security in Mobile Ad Hoc Networks (pages 355โ374): Mike Burmester, Panayiotis Kotzanikolaou and Dr. Christos Douligeris
Chapter 21 Wireless Sensor Networks (pages 375โ390): Artemios G. Voyiatzis and Dr. Dimitrios N. Serpanos
Chapter 22 Trust (pages 391โ403): Lidong Chen
Chapter 23 PKI Systems (pages 409โ418): Dr. Nikos Komninos
Chapter 24 Privacy in Electronic Communications (pages 419โ440): Alf Zugenmaier and Joris Claessens
Chapter 25 Securing Digital Content (pages 441โ457): Magda M. Mourad and Ahmed N. Tantawy
๐ SIMILAR VOLUMES
<p>This volume provides a comprehensive, state-of-the art review of the field of cell therapy. The volume begins with an overview of the breadth of the field and then turns to overviews of imaging technologies that can aid in both safety and efficacy evaluations. The book then turns to numerous cont
<p>Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources