Cargando…

Network Infrastructure Security

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infra...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wong, Angus (Autor), Yeung, Alan (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4419-0166-8
003 DE-He213
005 20220116174357.0
007 cr nn 008mamaa
008 100301s2009 xxu| s |||| 0|eng d
020 |a 9781441901668  |9 978-1-4419-0166-8 
024 7 |a 10.1007/978-1-4419-0166-8  |2 doi 
050 4 |a TK7885-7895 
050 4 |a TK5105.5-5105.9 
072 7 |a UK  |2 bicssc 
072 7 |a COM059000  |2 bisacsh 
072 7 |a UK  |2 thema 
082 0 4 |a 621.39  |2 23 
082 0 4 |a 004.6  |2 23 
100 1 |a Wong, Angus.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Network Infrastructure Security  |h [electronic resource] /  |c by Angus Wong, Alan Yeung. 
250 |a 1st ed. 2009. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2009. 
300 |a XIV, 266 p. 10 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a to Network Infrastructure Security -- Network Infrastructure Security #x2019; Switching -- Network Infrastructure Security #x2013; Routing -- Network Infrastructure Security #x2019; Address Configuration and Naming -- Experiments for Illustrating Network Infrastructure Attacks -- Protecting Network Infrastructure - A New Approach. 
520 |a Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised. Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field. Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions. About the authors Angus Kin-Yeung Wong obtained his BSc and PhD degrees from City University of Hong Kong and is currently an associate professor at Macao Polytechnic Institute. Alan Kai-Hau Yeung obtained his BSc and PhD degrees from the Chinese University of Hong Kong and is currently an associate professor at City University of Hong Kong. Wong and Yeung have been collaborating in network-related research for over 10 years. 
650 0 |a Computer engineering. 
650 0 |a Computer networks . 
650 1 4 |a Computer Engineering and Networks. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Yeung, Alan.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441954923 
776 0 8 |i Printed edition:  |z 9781441901798 
776 0 8 |i Printed edition:  |z 9781441901651 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4419-0166-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)