A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
From the reviews:
¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS
"Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... ." (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)
A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerEUR 7,51 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerAnbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.1. Artikel-Nr. G0387952136I2N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.1. Artikel-Nr. G0387952136I4N00
Anzahl: 1 verfügbar
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
Zustand: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9780387952130. Artikel-Nr. 9377015
Anzahl: 1 verfügbar
Anbieter: Ammareal, Morangis, Frankreich
Hardcover. Zustand: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations. Artikel-Nr. E-551-369
Anzahl: 1 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 240 Illus., Maps. Artikel-Nr. 5677214
Anzahl: 4 verfügbar
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Artikel-Nr. ABNR-90197
Anzahl: 1 verfügbar
Anbieter: CSG Onlinebuch GMBH, Darmstadt, Deutschland
Gebunden. Zustand: Gut. Gebraucht - Gut Verlagsmängelex., XXVI, 209 p. 91 illus This new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. An integrated, security-on-demand system is first modeled, then simulated extensively on a large-scale asynchronous distributed simulator, and finally, the performance results are detailed. Artikel-Nr. 14485
Anzahl: 1 verfügbar
Anbieter: CURIO, Grimsby, N. E. Lincolnshire, Vereinigtes Königreich
Hardcover. Zustand: Very Good. No Jacket. 1st Edition. First Edition / First Print (number line on copyright page 9 8 7 6 5 4 3 2 1). Hardback copy in pictorial boards, no dustjacket as issued. 209pp. B/w charts and graphs throughout. Light wear to board edges. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. (22/1). Artikel-Nr. ABE-1639236967731
Anzahl: 4 verfügbar
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Artikel-Nr. ABNR-197505
Anzahl: 1 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9780387952130_new
Anzahl: Mehr als 20 verfügbar