Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field’s leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
- Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions.
* Examples illustrate core security concepts for enhanced comprehension
Researchers, scientists, engineers, practitioners, government employees, and graduate students working or studying in the area of network security
Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp
Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp
Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp
Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp
Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp
Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp
Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp
Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp
Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp
Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp
- No. of pages:
- © Morgan Kaufmann 2008
- 16th May 2008
- Morgan Kaufmann
- Hardcover ISBN:
- eBook ISBN:
Assistant Professor, University of Pittsburgh, PA, USA
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.