Network Infrastructure Security

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infra...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Yeung, Alan (Συγγραφέας), Wong, Angus (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2009.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03614nam a22004695i 4500
001 978-1-4419-0166-8
003 DE-He213
005 20151204184244.0
007 cr nn 008mamaa
008 100301s2009 xxu| s |||| 0|eng d
020 |a 9781441901668  |9 978-1-4419-0166-8 
024 7 |a 10.1007/978-1-4419-0166-8  |2 doi 
040 |d GrThAP 
050 4 |a TK7885-7895 
072 7 |a UY  |2 bicssc 
072 7 |a COM059000  |2 bisacsh 
082 0 4 |a 621.39  |2 23 
100 1 |a Yeung, Alan.  |e author. 
245 1 0 |a Network Infrastructure Security  |h [electronic resource] /  |c by Alan Yeung, Angus Wong. 
264 1 |a Boston, MA :  |b Springer US,  |c 2009. 
300 |a XIV, 266 p. 10 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a to Network Infrastructure Security -- Network Infrastructure Security #x2019; Switching -- Network Infrastructure Security #x2013; Routing -- Network Infrastructure Security #x2019; Address Configuration and Naming -- Experiments for Illustrating Network Infrastructure Attacks -- Protecting Network Infrastructure – A New Approach. 
520 |a Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised. Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field. Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions. About the authors Angus Kin-Yeung Wong obtained his BSc and PhD degrees from City University of Hong Kong and is currently an associate professor at Macao Polytechnic Institute. Alan Kai-Hau Yeung obtained his BSc and PhD degrees from the Chinese University of Hong Kong and is currently an associate professor at City University of Hong Kong. Wong and Yeung have been collaborating in network-related research for over 10 years. 
650 0 |a Computer science. 
650 0 |a Computer organization. 
650 0 |a Computer communication systems. 
650 0 |a Computer engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Engineering. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Wong, Angus.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781441901651 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4419-0166-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)