CHF 135.00

Network Infrastructure Security

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.
Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.

Summary

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.
Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.

Additional text

From the reviews:
"Network infrastructure security focuses on how to detect and prevent routers and other network devices from being compromised. … this book deals with an emerging issue that is both topical and increasingly critical for network managers across the Internet. … The book makes effective use of figures and examples to illustrate both attacks and countermeasures. It is an excellent source of key information, and I strongly recommend it to those who have the basic knowledge to benefit from its pages." (Charles K. Davis, ACM Computing Reviews, August, 2009)


“This monograph analyzes security threats and their possible countermeasures within the Internet’s layers below the application level, i.e., with its switches, routers, and related transport infrastructure. … This book … used as a textbook in a security course for upper-division undergraduates and graduate students. It will also interest network engineers and research practitioners. Each chapter features many helpful illustrations to facilitate an understanding of the concepts presented and ends with a reference list. Summing Up: Recommended. Upper-division undergraduates through professionals.” (E. M. Aupperle, Choice, Vol. 47 (8), April, 2010)

Report

From the reviews:
"Network infrastructure security focuses on how to detect and prevent routers and other network devices from being compromised. ... this book deals with an emerging issue that is both topical and increasingly critical for network managers across the Internet. ... The book makes effective use of figures and examples to illustrate both attacks and countermeasures. It is an excellent source of key information, and I strongly recommend it to those who have the basic knowledge to benefit from its pages." (Charles K. Davis, ACM Computing Reviews, August, 2009)
"This monograph analyzes security threats and their possible countermeasures within the Internet's layers below the application level, i.e., with its switches, routers, and related transport infrastructure. ... This book ... used as a textbook in a security course for upper-division undergraduates and graduate students. It will also interest network engineers and research practitioners. Each chapter features many helpful illustrations to facilitate an understanding of the concepts presented and ends with a reference list. Summing Up: Recommended. Upper-division undergraduates through professionals." (E. M. Aupperle, Choice, Vol. 47 (8), April, 2010)

Product details

Authors Alan Yeung, Angus Wong, Angu Wong
Publisher Springer, Berlin
 
Content Book
Product form Paperback / Softback
Publication date 11.05.2011
Subject Natural sciences, medicine, IT, technology > IT, data processing > Hardware
Guides
 
EAN 9781441954923
ISBN 978-1-4419-5492-3
Pages 266
Illustrations XIV, 266 p. 10 illus.
Dimensions (packing) 15.5 x 23.5 cm
Weight (packing) 425 g
 
Subjects A, Security, Netzwerk-Hardware, computer science, computer hardware, TCP/IP, Configuration, data security, Computer Communication Networks, Computer Engineering, Computer Engineering and Networks, Computer Systems Organization and Communication Networks, Computer organization, Computer communication systems, Computer networking & communications, Network hardware
 

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.