|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Angus Wong , Alan YeungPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2009 ed. Dimensions: Width: 15.50cm , Height: 1.80cm , Length: 23.50cm Weight: 0.522kg ISBN: 9781441901651ISBN 10: 1441901655 Pages: 266 Publication Date: 28 April 2009 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contentsto Network Infrastructure Security.- Network Infrastructure Security #x2019; Switching.- Network Infrastructure Security #x2013; Routing.- Network Infrastructure Security #x2019; Address Configuration and Naming.- Experiments for Illustrating Network Infrastructure Attacks.- Protecting Network Infrastructure – A New Approach.ReviewsFrom the reviews: Network infrastructure security focuses on how to detect and prevent routers and other network devices from being compromised. ... this book deals with an emerging issue that is both topical and increasingly critical for network managers across the Internet. ... The book makes effective use of figures and examples to illustrate both attacks and countermeasures. It is an excellent source of key information, and I strongly recommend it to those who have the basic knowledge to benefit from its pages. (Charles K. Davis, ACM Computing Reviews, August, 2009) This monograph analyzes security threats and their possible countermeasures within the Internet's layers below the application level, i.e., with its switches, routers, and related transport infrastructure. ... This book ... used as a textbook in a security course for upper-division undergraduates and graduate students. It will also interest network engineers and research practitioners. Each chapter features many helpful illustrations to facilitate an understanding of the concepts presented and ends with a reference list. Summing Up: Recommended. Upper-division undergraduates through professionals. (E. M. Aupperle, Choice, Vol. 47 (8), April, 2010) From the reviews: Network infrastructure security focuses on how to detect and prevent routers and other network devices from being compromised. this book deals with an emerging issue that is both topical and increasingly critical for network managers across the Internet. The book makes effective use of figures and examples to illustrate both attacks and countermeasures. It is an excellent source of key information, and I strongly recommend it to those who have the basic knowledge to benefit from its pages. (Charles K. Davis, ACM Computing Reviews, August, 2009) This monograph analyzes security threats and their possible countermeasures within the Internet 's layers below the application level, i.e., with its switches, routers, and related transport infrastructure. This book used as a textbook in a security course for upper-division undergraduates and graduate students. It will also interest network engineers and research practitioners. Each chapter features many helpful illustration "From the reviews: ""Network infrastructure security focuses on how to detect and prevent routers and other network devices from being compromised. … this book deals with an emerging issue that is both topical and increasingly critical for network managers across the Internet. … The book makes effective use of figures and examples to illustrate both attacks and countermeasures. It is an excellent source of key information, and I strongly recommend it to those who have the basic knowledge to benefit from its pages."" (Charles K. Davis, ACM Computing Reviews, August, 2009) “This monograph analyzes security threats and their possible countermeasures within the Internet’s layers below the application level, i.e., with its switches, routers, and related transport infrastructure. … This book … used as a textbook in a security course for upper-division undergraduates and graduate students. It will also interest network engineers and research practitioners. Each chapter features many helpful illustrations to facilitate an understanding of the concepts presented and ends with a reference list. Summing Up: Recommended. Upper-division undergraduates through professionals.” (E. M. Aupperle, Choice, Vol. 47 (8), April, 2010)" Author InformationTab Content 6Author Website:Countries AvailableAll regions |