Cargando…

Security in network functions virtualization /

The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and O...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Zhang, Zonghua (Autor), Meddahi, Ahmed (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Elsevier, 2017.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 SCIDIR_on1013815911
003 OCoLC
005 20231120010236.0
006 m o d
007 cr |||||||||||
008 171117s2017 ne o 000 0 eng d
040 |a NLE  |b eng  |e rda  |e pn  |c NLE  |d OCLCO  |d OCLCF  |d OPELS  |d YDX  |d MERER  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
019 |a 1013168727  |a 1080303437 
020 |a 9780081023716  |q (electronic bk.) 
020 |a 0081023715  |q (electronic bk.) 
020 |z 9781785482571  |q (hbk.) 
020 |z 1785482572 
035 |a (OCoLC)1013815911  |z (OCoLC)1013168727  |z (OCoLC)1080303437 
050 4 |a TK5105.5833 
082 0 4 |a 004.6  |2 23 
100 1 |a Zhang, Zonghua,  |e author. 
245 1 0 |a Security in network functions virtualization /  |c Zonghua Zhang, Ahmed Meddahi. 
264 1 |a Amsterdam :  |b Elsevier,  |c 2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV. 
520 |a The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services. 
504 |a Includes bibliographical references (pages 227-247) and index. 
505 0 |a Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation -- Data protection in NFV -- Conclusion. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Meddahi, Ahmed,  |e author. 
776 0 8 |i Print version:  |z 9781785482571 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781785482571  |z Texto completo