Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Network Security
By Scott C.-H. Huang (Edited by), David MacCallum (Edited by), Ding-Zhu Du (Edited by)

Rating
Format
Hardback, 280 pages
Published
United States, 1 October 2008

Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the ?eld of network security. This book contains 11 r- ereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff m- bers from Springer for publishing this work. Besides, we would like to dedicate this book to our families.


Our Price
HK$896
Ships from Australia Estimated delivery date: 21st Apr - 29th Apr from Australia
Free Shipping Worldwide

Buy Together
+
Buy together with Galaxies, Axisymmetric Systems and Relativity at a great price!
Buy Together
HK$1,214
Elsewhere Price
HK$1,267.45
You Save HK$53.45 (4%)

Product Description

Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the ?eld of network security. This book contains 11 r- ereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff m- bers from Springer for publishing this work. Besides, we would like to dedicate this book to our families.

Product Details
EAN
9780387738208
ISBN
0387738207
Other Information
4 Tables, black and white; XII, 280 p.
Dimensions
23.4 x 15.6 x 1.8 centimeters (0.62 kg)

Table of Contents

Secure Metering Schemes.- A Cryptographic Framework for the Controlled Release Of Certified Data.- Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions.- Web Forms and Untraceable DDoS Attacks.- Mechanical Verification of Cryptographic Protocols.- Routing Security in Ad Hoc Wireless Networks.- Insider Threat Assessment: Model, Analysis and Tool.- Toward Automated Intrusion Alert Analysis.- Conventional Cryptographic Primitives.- Efficient Trapdoor-Based Client Puzzle Against DoS Attacks.- Attacks and Countermeasures in Sensor Networks: A Survey.

Review this Product
Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond Retail Limited.

Back to top