This site may earn a commission as part of the eBay Partner Network and Amazon Associates Program if you make a purchase through our links.
78.67$ Buy It Now
Item | 235786053924 |
---|---|
Seller |
the_nile_uk_store ( 30336 ⭐ ) 98.6% Location: Ohio, US Accept Payments With , |
Shipping | See shipping cost, Ships to Worldwide, ... |
Guarantee | eBay Money Back Guarantee |
Condition | Brand New |
ISBN-13 | 9780387952130 |
Book Title | Principles of Secure Network Systems Design |
ISBN | 9780387952130 |
A framework for network security which may be used by the military, government, industry, and academia network personnel.
FORMATHardcover LANGUAGEEnglish CONDITIONBrand New Publisher DescriptionAs e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.
NotesA fundamental, comprehensive framework for network security which may be used by the military, government, industry, and academia network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. This book is intended for researchers and graduate students in computer science and engineering, specializing in network security, practitioners in network security, and architects and policy makers for large-scale network infrastructure.
Author BiographySumit Ghosh is the associate chair for research and graduate programs in the Computer Science and Engineering Department at Arizona State University. Previously, he had been on the faculty at Brown University and has held research positions in private industry. Dr. Ghosh's research has pioneered work in areas such as preemptive semantics for inertial delays in hardware description languages; execution of VHDL models on distributed processors; behavior-level fault modeling; asynchronous distributed fault simulation; timing verification of asynchronous digital designs; deadlock-free distributed
Table of Contents1 Evolution of Network Security and Lessons Learned from History.- 1.1 Introduction.- 1.2 History of Security and Its Influence on Information Networks.- 1.3 Lessons Learned from History.- 1.4 Growing Interest in Network Security.- 1.5 Origin and Nature of Security in Networks.- 1.6 Principal Characteristics of Network Security.- 1.7 Secure Network Designs Through Modeling and Simulation.- 1.8 Problems and Exercises.- 2 A Fundamental Framework for Network Security.- 2.1 Introduction.- 2.2 The Changing Paradigm of Network Security.- 2.3 Review of the Literature on Network Security.- 2.4 The National Security Agency's Network Rating Model (NRM).- 2.5 A Fundamental Framework for Network Security.- 2.6 Uses of the Fundamental Framework for Network Security.- 2.7 Problems and Exercises.- 3 User-Level Security on Demand in ATM Networks: A New Paradigm.- 3.1 Review of the Literature on Security in ATM Networks.- 3.2 The Need for User-Level Security on Demand.- 3.3 Security on Demand in ATM Networks.- 3.4 Problems and Exercises.- 4 The Concept of Node Status Indicator (NSI) and Performance Analysis.- 4.1 Introduction.- 4.2 The Concept of Node Status Indicator (NSI): Refinind Distributed Resource Allocation.- 4.3 Modeling Security on Demand for a Representative ATM Network and Implementation Issues.- 4.4 Synthesis of the Input Traffic for Network Performance Analysis Under Security on Demand.- 4.5 The Design of Experiments, Simulation Results, and Performance Analysis.- 4.6 Problems and Exercises.- 5 "Mixed-Use" Network.- 5.1 Introduction.- 5.2 Mixed-use Networks: Integrating the Military's Secure ATM Networks with the Public ATM Infrastructure.- 5.3 Modeling and Distributed Simulation of the Representative ATM Networks.- 5.4 Call Setup in a Mixed-Use ATM Network.- 5.5Modeling the Represent ative ATM Networks.- 5.6 Simulation Experiments and Performance Analysis.- 5.7 Problems and Exercises.- 6 Synthesis of Security Attack Models for ATM Networks.- 6.1 Brief Review of the Current Literature on Attack Models.- 6.2 Fundamental Characteristics of ATM Networks.- 6.3 Synthesis of Security Attack Models for ATM Networks.- 6.4 Modeling, Simulation, and Behavior Analysis of Security Attack Models.- 6.5 Problems and Exercises.- 7 Complex Vulnerabilities and Highly Sophisticated Attacks.- 7.1 Influence of Source Traffic Distribution on Quality of Service.- 7.2 Susceptability of the Traditional ATM Output Buffer Architecture to UNI-Compliant Traffic.- 7.3 Problems and Exercises.- 8 Future Issues in Information Systems Security.- References.
ReviewFrom the reviews: 'Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government...this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. "ACM COMPUTER REVIEWS "Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ! this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ! ." (Keith Wain, , February, 2003)
PromotionalSpringer Book Archives
Long DescriptionAs e-commerce becomes the norm of business transactions and information be
Review QuoteFrom the reviews:¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS"Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! … this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well … ." (Keith Wain, , February, 2003)
Description for Sales PeopleA fundamental, comprehensive framework for network security which may be used by the military, government, industry, and academia network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. This book is intended for researchers and graduate students in computer science and engineering, specializing in network security, practitioners in network security, and architects and policy makers for large-scale network infrastructure.
Details ISBN0387952136 Author H. Lawson Short Title PRINCIPLES OF SECURE NETWORK S Language English ISBN-10 0387952136 ISBN-13 9780387952130 Media Book Format Hardcover DEWEY 005.8 Year 2002 Imprint Springer-Verlag New York Inc. Place of Publication New York, NY Country of Publication United States Residence Hoboken Birth 1958 Affiliation Arizona State Univ. Pages 209 DOI 10.1007/b81237 AU Release Date 2002-04-12 NZ Release Date 2002-04-12 US Release Date 2002-04-12 UK Release Date 2002-04-12 Publisher Springer-Verlag New York Inc. Edition Description 2002 ed. Edition 2002nd Publication Date 2002-04-12 Alternative 9781461265382 Illustrations XXVI, 209 p. Audience Postgraduate, Research & Scholarly We've got thisAt The Nile, if you're looking for it, we've got it.With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love!
30 DAY RETURN POLICYNo questions asked, 30 day returns!
FREE DELIVERYNo matter where you are in the UK, delivery is free.
SECURE PAYMENTPeace of mind by paying through PayPal and eBay Buyer Protection TheNile_Item_ID:137610846;
No more products to load
Your request is processing... Please Wait