A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
"synopsis" may belong to another edition of this title.
From the reviews:
¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS
"Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... ." (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)
"About this title" may belong to another edition of this title.
US$ 15.77 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: Anybook.com, Lincoln, United Kingdom
Condition: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9780387952130. Seller Inventory # 9377015
Quantity: 1 available
Seller: Ammareal, Morangis, France
Hardcover. Condition: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # E-551-369
Quantity: 1 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 240, Maps. Seller Inventory # 262170689
Quantity: 4 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 240 Illus., Maps. Seller Inventory # 5677214
Quantity: 4 available
Seller: CSG Onlinebuch GMBH, Darmstadt, Germany
Gebunden. Condition: Gut. Gebraucht - Gut Verlagsmängelex., XXVI, 209 p. 91 illus This new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. An integrated, security-on-demand system is first modeled, then simulated extensively on a large-scale asynchronous distributed simulator, and finally, the performance results are detailed. Seller Inventory # 14485
Quantity: 1 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 240. Seller Inventory # 182170699
Quantity: 4 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-90197
Quantity: 1 available
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEJUNE24-89212
Quantity: 1 available
Seller: CURIO, Grimsby, N. E. Lincolnshire, United Kingdom
Hardcover. Condition: Very Good. No Jacket. 1st Edition. First Edition / First Print (number line on copyright page 9 8 7 6 5 4 3 2 1). Hardback copy in pictorial boards, no dustjacket as issued. 209pp. B/w charts and graphs throughout. Light wear to board edges. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. (22/1). Seller Inventory # ABE-1639236967731
Quantity: 4 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-197505
Quantity: 1 available