Network Security Attacks and Countermeasures

Nonfiction, Computers, Networking & Communications, Computer Security, Application Software, General Computing
Cover of the book Network Security Attacks and Countermeasures by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466687639
Publisher: IGI Global Publication: January 18, 2016
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466687639
Publisher: IGI Global
Publication: January 18, 2016
Imprint: Information Science Reference
Language: English

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

More books from IGI Global

Cover of the book Innovative Practices in Teacher Preparation and Graduate-Level Teacher Education Programs by
Cover of the book Health Economics and Healthcare Reform by
Cover of the book Emerging Pervasive and Ubiquitous Aspects of Information Systems by
Cover of the book User-Centered Design Strategies for Massive Open Online Courses (MOOCs) by
Cover of the book Consumer-Driven Technologies in Healthcare by
Cover of the book Internet and Technology Addiction by
Cover of the book Cases on Cultural Implications and Considerations in Online Learning by
Cover of the book Effects of Information Capitalism and Globalization on Teaching and Learning by
Cover of the book Optimal Inventory Control and Management Techniques by
Cover of the book Optimizing Information Security and Advancing Privacy Assurance by
Cover of the book Handbook of Research on Critical Examinations of Neurodegenerative Disorders by
Cover of the book Governometrics and Technological Innovation for Public Policy Design and Precision by
Cover of the book Emerging Applications in Supply Chains for Sustainable Business Development by
Cover of the book Enabling Real-Time Mobile Cloud Computing through Emerging Technologies by
Cover of the book Model-Driven Domain Analysis and Software Development by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy