Understand the fundamental theory and practical design aspects of green and soft wireless communications networks with this expert text. It provides comprehensive and unified coverage of 5G physical layer design, as well as design of the higher and radio access layers and the core network, drawing o
Software-defined networking and security: from theory to practice
β Scribed by Chowdhary, Ankur; Huang, Dijiang; Pisharody, Sandeep
- Publisher
- CRC Press/Taylor & Francis Group
- Year
- 2018
- Tongue
- English
- Leaves
- 357
- Series
- Data-enabled engineering
- Edition
- First edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
"This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. Β Read more...
Abstract: "This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. It covers modern computing paradigms such as Software-Defined Networks and Network Functions Virtualization (SDN-NFV), and their effectiveness in implementing Moving Target Defense responses. Source codes, online labs, and exercises are available at the author's university website"
β¦ Table of Contents
Content: Part I: Computer Network Foundation. Introduction. Network Interconnection. Virtual Network. SDN and NFV. Part II: Network Security Foundation. Network Security Preliminary. Firewalls. Network Intrusion Detection. Penetration and Testing. Authentication and Access Control. Part III: Advanced Topics in Network Security. Moving Target Defense (MTD). Attack Representation. Attack Mitigation Techniques. Countermeasure Analysis. Advanced Topics. Lab Book: ThoTh Lab (hosted online at ASU). Introduction of ThoTh Lab. Network Security. Software Defined Networking. Network Function Virtualization. Appendix: Source Codes of SDN and MTD Schemes.
β¦ Subjects
Software-defined networking (Computer network technology)
π SIMILAR VOLUMES
<p><p>This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoftβs threat modeling framework STRIDE.</p><p>Before deploying new technologies in the production environment, their security aspects must be co
<b>Introductory textbook in the important area of network security for undergraduate and graduate students</b> <ul> <li>Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security</li> <li>Fully updated to reflect new dev
<p><STRONG>Software Visualization: From Theory to Practice</STRONG> was initially selected as a special volume for "The Annals of Software Engineering (ANSE) Journal", which has been discontinued. This special edited volume, is the first to discuss software visualization in the perspective of softwa
Written by an industry professional, the book is a lucid explanation of Software Defined Networking (SDN) both for students as well as for decision makers in industry. It explains what SDN means to businesses and organizations so that leaders can make informed decisions. It is a comprehensive presen
This book provides a comprehensive review of the contribution of network analysis to the understanding of tourism destinations and organizations. It discusses both the theoretical and methodological underpinnings of network analysis and then illustrates the relevance of this approach in a series of