A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
"Sinopsis" puede pertenecer a otra edición de este libro.
From the reviews:
¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS
"Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... ." (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)
A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: Anybook.com, Lincoln, Reino Unido
Condición: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9780387952130. Nº de ref. del artículo: 9377015
Cantidad disponible: 1 disponibles
Librería: Ammareal, Morangis, Francia
Hardcover. Condición: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations. Nº de ref. del artículo: E-551-369
Cantidad disponible: 1 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. pp. 240, Maps. Nº de ref. del artículo: 262170689
Cantidad disponible: 4 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. pp. 240 Illus., Maps. Nº de ref. del artículo: 5677214
Cantidad disponible: 4 disponibles
Librería: Biblios, Frankfurt am main, HESSE, Alemania
Condición: New. pp. 240. Nº de ref. del artículo: 182170699
Cantidad disponible: 4 disponibles
Librería: Romtrade Corp., STERLING HEIGHTS, MI, Estados Unidos de America
Condición: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Nº de ref. del artículo: ABNR-90197
Cantidad disponible: 1 disponibles
Librería: Basi6 International, Irving, TX, Estados Unidos de America
Condición: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Nº de ref. del artículo: ABEOCT25-85963
Cantidad disponible: 1 disponibles
Librería: CURIO, Cleethorpes, North East Lincolnshire, Reino Unido
Hardcover. Condición: Very Good. No Jacket. 1st Edition. First Edition / First Print (number line on copyright page 9 8 7 6 5 4 3 2 1). Hardback copy in pictorial boards, no dustjacket as issued. 209pp. B/w charts and graphs throughout. Light wear to board edges. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. (22/1). Nº de ref. del artículo: ABE-1639236967731
Cantidad disponible: 4 disponibles
Librería: Romtrade Corp., STERLING HEIGHTS, MI, Estados Unidos de America
Condición: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Nº de ref. del artículo: ABNR-197505
Cantidad disponible: 1 disponibles
Librería: Basi6 International, Irving, TX, Estados Unidos de America
Condición: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Nº de ref. del artículo: ABEOCT25-85964
Cantidad disponible: 3 disponibles