|
" Network security, administration, and management : "
Dulal Chandra Kar, Mahbubur Rahman Syed, [editors]
Document Type
|
:
|
BL
|
Record Number
|
:
|
694039
|
Doc. No
|
:
|
b516228
|
Title & Author
|
:
|
Network security, administration, and management : : advancing technology and practice /\ Dulal Chandra Kar, Mahbubur Rahman Syed, [editors]
|
Publication Statement
|
:
|
Hershey, PA :: Information Science Reference,, c2011
|
Page. NO
|
:
|
xxi, 361 p. :: ill. ;; 29 cm
|
ISBN
|
:
|
1609607775 (hardcover)
|
|
:
|
: 1609607783 (ebook)
|
|
:
|
: 1609607791 (print & perpetual access)
|
|
:
|
: 9781609607777 (hardcover)
|
|
:
|
: 9781609607784 (ebook)
|
|
:
|
: 9781609607791 (print & perpetual access)
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references (p. 324-347) and index
|
Contents
|
:
|
Basic device and protocol security / Bruce Hartpence -- Mitigating the blended threat : protecting data and educating users / Christophe Veltsos -- Security issues for multi-domain resource reservation / Christos Bouras, Kostas Stamos -- Healthcare employees and passwords : an entry point for social engineering attacks / B. Dawn Medlin, Douglas May, Key Corley -- Public key infrastructure / Reed Petty, Jiang Bain, Remzi Seker -- Key management / Chuan-Kun Wu -- Security assessment of networks / Aftab Ahmad -- Network security auditing / Yin Pan, Bo Yuan, Sumita Mishra -- Network manageability security / Salvador Mandujano -- Security and attacks in wireless sensor networks / Murat Al, Kenji Yoshigoe -- Wireless sensor networks : emerging applications and security solutions / Sumita Mishra -- Privacy preserving data gathering in wireless sensor networks / Md. Golam Kaosar, Xun Yi -- Banbad : a centralized anomaly detection technique for ad hoc networks / Rajeev Agrawal, ... [et al.] -- Data regulation for source-end mitigation of distribution denial of service / Nirav Shah, Dijang Huang -- Instant messaging security / Zhijun Liu, Guoqiang Shu, David Lee
|
Abstract
|
:
|
"This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems"--
|
Subject
|
:
|
Computer networks-- Management
|
Subject
|
:
|
Computer networks-- Security measures
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
TK5105.5.N466724 2011
|
Added Entry
|
:
|
Kar, Dulal Chandra,1960-
|
|
:
|
Syed, Mahbubur Rahman,1952-
|
| |