Atjaunināt sīkdatņu piekrišanu

E-grāmata: Network Security Attacks and Countermeasures

Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 243,88 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"This book discusses the security and optimization of computer networks for use in a variety of disciplines and fields, touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection"--

Computer and information scientists seek to increase evolutionary computation awareness in network security by providing a clear direction for monitoring, analyzing, and detecting network attacks. Among their topics are security issues in mobile wireless networks, a classification of network attacks and countermeasures of different attacks, cluster-based countermeasures for distributed denial of service attacks, countering RSA vulnerabilities and replacing it with an elliptic curve cryptographic scheme for key generation, and changing dynamics of network security involving hacking/cracking with next-generation firewalls. Annotation ©2016 Ringgold, Inc., Portland, OR (protoview.com)

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
Preface xiii
Chapter 1 Introduction to Network Security
1(48)
C. V. Anchugam
K. Thangadurai
Chapter 2 Security Issues in Mobile Wireless Networks
49(29)
Arif Sari
Chapter 3 Virtual Private Networks
78(37)
Alok Vishwakarma
Chapter 4 Classification of Network Attacks and Countermeasures of Different Attacks
115(42)
C. V. Anchugam
K. Thangadurai
Chapter 5 Attacks in Wireless Sensor Networks
157(19)
George William Kibirige
Camilius A. Sanga
Chapter 6 Sensors Network: In Regard with the Security Aspect and Counter Measures
176(21)
Matnta Bachani
Ahsan Memon
Faisal Karim Shaikh
Chapter 7 DDoS Attacks and Their Types
197(9)
Dileep Kumar
Chapter 8 Cluster-Based Countermeasures for DDoS Attacks
206(22)
Mohammad Jabed Morshed Chowdhury
Dileep Kumar G
Chapter 9 Intrusion Detection System (IDS) and Their Types
228(17)
Manoranjan Pradhan
Chinmaya Kumar Nayak
Sateesh Kumar Pradhan
Chapter 10 Intrusion Prevention System
245(14)
Bijaya Kumar Panda
Manoranjan Pradhan
Sateesh Kumar Pradhan
Chapter 11 AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection
259(11)
P. Natesan
P. Balasubramanie
G. Gowrison
Chapter 12 Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation
270(43)
Behnam Rahnama
Arif Sari
Marwan Yassin Ghafour
Chapter 13 Changing Dynamics of Network Security involving Hacking/Cracking with Next Generation Firewalls (NGFW)
313(16)
Alok Vishwakarma
Wafa Waheeda S
Compilation of References 329(21)
About the Contributors 350(5)
Index 355
Kumar G. Dileep, Adama Science and Technology University, Ethiopia.

Manoj Kumar Singh, Adama Science and Technology University, Ethiopia.

M. K. Jayanthi, King Khalid University, Saudi Arabia.