Network Security: Current Status and Future Directions
A unique overview of network security issues, solutions, and methodologies at an architectural and research level
Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more.
Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry.
Complete with strategies for implementing security mechanisms and techniques, Network Security features:
State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures
Problems and solutions for a wide range of network technologies, from fixed point to mobile
Methodologies for real-time and non-real-time applications and protocols
What people are saying - Write a review
We haven't found any reviews in the usual places.
Part Two Secure Services
Part Three Mobile and Security
Other editions - View all
3GPP access control adversary algorithm anonymity applications authentication Bluetooth certiﬁcate cipher communication Computer conﬁdentiality conﬁguration cryptographic cryptosystems DDoS DDoS attacks decryption deﬁned device digital signature distributed e-mail e-services efﬁcient encryption Engineering Task Force entity example ﬁeld ﬁle ﬁnd ﬁrewall ﬁrst ﬂexibility ﬂood function grid hash header hoc networks host identiﬁed identity IDSs IEEE implementation infrastructure integrity intrusion detection IPSec IPv6 key exchange layer malicious mobile agents mode multicast network security node nonrepudiation operation packet party Proceedings proﬁle protection public key public key infrastructure request routers routing protocol secret key security mechanisms security requirements sender sensor networks server service provider signiﬁcant solutions speciﬁc standard is available stream cipher tion trafﬁc transactions trust tunnel UMTS veriﬁcation virtual private networks VoIP vulnerability Web services wireless networks XML encryption XML signature