Network Security Attacks and Countermeasures

Nonfiction, Computers, Networking & Communications, Computer Security, Application Software, General Computing
Cover of the book Network Security Attacks and Countermeasures by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466687639
Publisher: IGI Global Publication: January 18, 2016
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466687639
Publisher: IGI Global
Publication: January 18, 2016
Imprint: Information Science Reference
Language: English

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

More books from IGI Global

Cover of the book Probabilistic Nodes Combination (PNC) for Object Modeling and Contour Reconstruction by
Cover of the book Cross-Cultural Training and Teamwork in Healthcare by
Cover of the book Advanced Methodologies and Technologies in Modern Education Delivery by
Cover of the book Handbook of Research on Mobility and Computing by
Cover of the book Key Challenges and Opportunities in Web Entrepreneurship by
Cover of the book Business Infrastructure for Sustainability in Developing Economies by
Cover of the book Handbook of Research on Psychosocial Perspectives of Human Communication Disorders by
Cover of the book Geo-Regional Competitiveness in Central and Eastern Europe, the Baltic Countries, and Russia by
Cover of the book Technology Adoption and Social Issues by
Cover of the book Intercultural Relations and Ethnic Conflict in Asia by
Cover of the book Mission-Driven Approaches in Modern Business Education by
Cover of the book Emerging Pedagogies in the Networked Knowledge Society by
Cover of the book Proliferation of Open Government Initiatives and Systems by
Cover of the book Applying Principles from IT Architecture to Strategic Business Planning by
Cover of the book Dynamic Methods and Process Advancements in Mechanical, Manufacturing, and Materials Engineering by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy