Cargando…

Automated Firewall Analytics Design, Configuration and Optimization /

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the ch...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Al-Shaer, Ehab (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-10371-6
003 DE-He213
005 20220120073048.0
007 cr nn 008mamaa
008 140923s2014 sz | s |||| 0|eng d
020 |a 9783319103716  |9 978-3-319-10371-6 
024 7 |a 10.1007/978-3-319-10371-6  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Al-Shaer, Ehab.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Automated Firewall Analytics  |h [electronic resource] :  |b Design, Configuration and Optimization /  |c by Ehab Al-Shaer. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XIII, 132 p. 32 illus., 12 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Classification and Discovery of Firewalls Policy Anomalies -- Modeling and Verification of Firewall and IPSec Policies using Binary Decision Diagrams -- Specification and Refinement of a Conflict-Free Distributed Firewall Configuration Language -- Design and Configuration of Firewall Architecture Under Risk, Usability and Cost Constraints -- Dynamic Firewall Configuration Optimization. . 
520 |a This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference. 
650 0 |a Data protection. 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Data and Information Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Cryptology. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319103723 
776 0 8 |i Printed edition:  |z 9783319103709 
776 0 8 |i Printed edition:  |z 9783319363578 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-10371-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)