๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Network Security: Current Status and Future Directions


Publisher
Wiley-IEEE Press
Year
2007
Tongue
English
Leaves
569
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


A unique overview of network security issues, solutions, and methodologies at an architectural and research level

Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more.

Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry.

Complete with strategies for implementing security mechanisms and techniques, Network Security features:


State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures


Problems and solutions for a wide range of network technologies, from fixed point to mobile
*

Methodologies for real-time and non-real-time applications and protocolsContent:
Chapter 1 Computer Network Security: Basic Background and Current Issues (pages 1โ€“12): Panayiotis Kotzanikolaou and Dr. Christos Douligeris
Chapter 2 Secure Routing (pages 15โ€“32): Ioannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy and Dr. Randy Wang
Chapter 3 Designing Firewalls: A Survey (pages 33โ€“49): Angelos D. Keromytis and Vassilis Prevelakis
Chapter 4 Security in Virtual Private Networks (pages 51โ€“63): Dr. Srinivas Sampalli
Chapter 5 IP Security (IPSec) (pages 65โ€“82): Anirban Chakrabarti and Manimaran Govindarasu
Chapter 6 IDS for Networks (pages 83โ€“97): John C. McEachen and John M. Zachary
Chapter 7 Intrusion Detection Versus Intrusion Protection (pages 99โ€“115): Luis Sousa Cardoso
Chapter 8 Denial?of?Service Attacks (pages 117โ€“134): Aikaterini Mitrokotsa and Christos Douligeris
Chapter 9 Secure Architectures with Active Networks (pages 135โ€“151): Dr. Srinivas Sampalli, Yaser Haggag and Christian Labonte
Chapter 10 Security in E?Services and Applications (pages 157โ€“177): Manish Mehta, Sachin Singh and Yugyung Lee
Chapter 11 Security in Web Services (pages 179โ€“204): Christos Douligeris and Dr. George P. Ninios
Chapter 12 Secure Multicasting (pages 205โ€“227): Dr. Constantinos Boukouvalas and Anthony G. Petropoulos
Chapter 13 Voice Over IP Security (pages 229โ€“245): Son Vuong and Kapil Kumar Singh
Chapter 14 Grid Security (pages 247โ€“256): Kyriakos Stefanidis, Artemios G. Voyiatzis and Dr. Dimitrios N. Serpanos
Chapter 15 Mobile Agent Security (pages 257โ€“269): Panayiotis Kotzanikolaou, Dr. Christos Douligeris, Rosa Mavropodi and Vassilios Chrissikopoulos
Chapter 16 Mobile Terminal Security (pages 275โ€“296): Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stephane Socie and Claire Whelan
Chapter 17 IEEE 802.11 Security (pages 297โ€“312): Daniel L. Lough, David J. Robinson and Ian G. Schneller
Chapter 18 Bluetooth Security (pages 313โ€“329): Christian Gehrmann
Chapter 19 Mobile Telecom Networks (pages 331โ€“353): Christos Xenakis and Lazaros Merakos
Chapter 20 Security in Mobile Ad Hoc Networks (pages 355โ€“374): Mike Burmester, Panayiotis Kotzanikolaou and Dr. Christos Douligeris
Chapter 21 Wireless Sensor Networks (pages 375โ€“390): Artemios G. Voyiatzis and Dr. Dimitrios N. Serpanos
Chapter 22 Trust (pages 391โ€“403): Lidong Chen
Chapter 23 PKI Systems (pages 409โ€“418): Dr. Nikos Komninos
Chapter 24 Privacy in Electronic Communications (pages 419โ€“440): Alf Zugenmaier and Joris Claessens
Chapter 25 Securing Digital Content (pages 441โ€“457): Magda M. Mourad and Ahmed N. Tantawy


๐Ÿ“œ SIMILAR VOLUMES


Cell Therapy: Current Status and Future
โœ Dwaine F. Emerich, Gorka Orive (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Humana Press ๐ŸŒ English

<p>This volume provides a comprehensive, state-of-the art review of the field of cell therapy. The volume begins with an overview of the breadth of the field and then turns to overviews of imaging technologies that can aid in both safety and efficacy evaluations. The book then turns to numerous cont

Wireless Sensor Networks: Current Status
โœ Shafiullah Khan (Editor); Al-Sakib Khan Pathan (Editor); Nabil Ali Alrajeh (Edit ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› CRC Press

<p>Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources