Handbook Of Security And Networks

Author:   Yang Xiao (The Univ Of Alabama, Usa) ,  Hui Chen (Cuny Brooklyn College, Usa) ,  Frank Haizhon Li (Univ Of South Carolina Upstate, Usa)
Publisher:   World Scientific Publishing Co Pte Ltd
ISBN:  

9789814273039


Pages:   576
Publication Date:   14 April 2011
Format:   Hardback
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Our Price $496.32 Quantity:  
Add to Cart

Share |

Handbook Of Security And Networks


Add your own review!

Overview

This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic.

Full Product Details

Author:   Yang Xiao (The Univ Of Alabama, Usa) ,  Hui Chen (Cuny Brooklyn College, Usa) ,  Frank Haizhon Li (Univ Of South Carolina Upstate, Usa)
Publisher:   World Scientific Publishing Co Pte Ltd
Imprint:   World Scientific Publishing Co Pte Ltd
Dimensions:   Width: 17.30cm , Height: 3.30cm , Length: 24.90cm
Weight:   1.098kg
ISBN:  

9789814273039


ISBN 10:   9814273031
Pages:   576
Publication Date:   14 April 2011
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Table of Contents

Applied Cryptography; Access Control; Authentication; Anonymity; Network Attacks; Malware; Key Management; Anomaly Detection; Network Security Applications; Security Policy and Legal Issues; Other Security Issues in Computer Networks.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List