Verwandte Artikel zu Evolving Networking Technologies: Developments and...

Evolving Networking Technologies: Developments and Future Directions - Hardcover

 
9781119836209: Evolving Networking Technologies: Developments and Future Directions

Inhaltsangabe

EVOLVING NETWORKING TECHNOLOGIES

This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.

The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.

The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:

  • Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
  • Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
  • Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.

Audience

This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorin bzw. den Autor

Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in international journals and conference proceedings.

Shaurya Gupta, PhD, is an assistant professor at the University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India. He completed his PhD in Information Technology from Amity University and has published research articles in international journals. His areas of interest are Delay Tolerant Networks, Wireless Sensor Networks, Ad Hoc Networks, IOT, and Machine Learning.

Ashish Sharma, PhD, is one of the key faculty members of the information retrieval and data mining group at GLA University, India. He has published many research papers in international journals, and his research interests are in the applications of data mining, machine learning, big data, business analytics, data/text mining, healthcare informatics, and service-oriented computing.

Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of the Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and image processing in biomedicine. He has over 50 publications and edited/authored 15 computer science books.

Von der hinteren Coverseite

This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.

The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.

The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:

  • Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
  • Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
  • Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.

Audience

This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

EUR 4,54 für den Versand von Vereinigtes Königreich nach Deutschland

Versandziele, Kosten & Dauer

Suchergebnisse für Evolving Networking Technologies: Developments and...

Beispielbild für diese ISBN

Kanta Prasad Sharma
Verlag: John Wiley and Sons, 2025
ISBN 10: 1119836204 ISBN 13: 9781119836209
Neu Hardcover

Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

HRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. FW-9781119836209

Verkäufer kontaktieren

Neu kaufen

EUR 169,84
Währung umrechnen
Versand: EUR 4,54
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 15 verfügbar

In den Warenkorb

Foto des Verkäufers

Sharma
Verlag: John Wiley & Sons, 2025
ISBN 10: 1119836204 ISBN 13: 9781119836209
Neu Hardcover

Anbieter: moluna, Greven, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Gebunden. Zustand: New. Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in interna. Artikel-Nr. 497471677

Verkäufer kontaktieren

Neu kaufen

EUR 182,45
Währung umrechnen
Versand: Gratis
Innerhalb Deutschlands
Versandziele, Kosten & Dauer

Anzahl: Mehr als 20 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Verlag: Wiley-Scrivener, 2023
ISBN 10: 1119836204 ISBN 13: 9781119836209
Neu Hardcover

Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: New. In. Artikel-Nr. ria9781119836209_new

Verkäufer kontaktieren

Neu kaufen

EUR 206,10
Währung umrechnen
Versand: EUR 5,74
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: Mehr als 20 verfügbar

In den Warenkorb

Foto des Verkäufers

Kanta Prasad Sharma
Verlag: Wiley Mai 2023, 2023
ISBN 10: 1119836204 ISBN 13: 9781119836209
Neu Hardcover

Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Buch. Zustand: Neu. Neuware - EVOLVING NETWORKING TECHNOLOGIESThis book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:\* Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.\* Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.\* Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.AudienceThis book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management. Artikel-Nr. 9781119836209

Verkäufer kontaktieren

Neu kaufen

EUR 225,12
Währung umrechnen
Versand: Gratis
Innerhalb Deutschlands
Versandziele, Kosten & Dauer

Anzahl: 2 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Verlag: Wiley-Scrivener, 2023
ISBN 10: 1119836204 ISBN 13: 9781119836209
Neu Hardcover

Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: New. Artikel-Nr. 392844375

Verkäufer kontaktieren

Neu kaufen

EUR 223,72
Währung umrechnen
Versand: EUR 10,21
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 3 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Sharma, Kanta Prasad (Editor)/ Gupta, Shaurya (Editor)/ Sharma, Ashish (Editor)/ Le, Dac-nhuong (Editor)
Verlag: Wiley-Scrivener, 2023
ISBN 10: 1119836204 ISBN 13: 9781119836209
Neu Hardcover

Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Hardcover. Zustand: Brand New. 300 pages. 10.00x7.00x0.75 inches. In Stock. Artikel-Nr. __1119836204

Verkäufer kontaktieren

Neu kaufen

EUR 243,03
Währung umrechnen
Versand: EUR 11,53
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 2 verfügbar

In den Warenkorb