Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:955867237:2545 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:955867237:2545?format=raw |
LEADER: 02545nam a22003975a 4500
001 013840616-2
005 20131206201837.0
008 121227s2002 xxu| s ||0| 0|eng d
020 $a9781461300298
020 $a9781461300298
020 $a9781461265382
024 7 $a10.1007/978-1-4613-0029-8$2doi
035 $a(Springer)9781461300298
040 $aSpringer
050 4 $aQA71-90
072 7 $aPBKS$2bicssc
072 7 $aMAT006000$2bisacsh
082 04 $a518$223
082 04 $a518$223
100 1 $aGhosh, Sumit,$d1958-$eauthor.
245 10 $aPrinciples of Secure Network Systems Design /$cby Sumit Ghosh.
264 1 $aNew York, NY :$bSpringer New York :$bImprint: Springer,$c2002.
300 $aXXVI, 209 p.$bonline resource.
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
505 0 $aHistory of network security and growing interest -- Principles of secure network design -- A fundamental framework for network security -- User-level security on demand in ATM networks: a new paradigm -- The concept of node status indicator (NSI) and performance analysis -- Mixed use networks -- Vulnerability analysis and synthesis of security attacks in ATM networks -- Network topology, performance, and security issues -- Inherent self healing in networks -- Future issues in network security.
520 $aThis new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. An integrated, security-on-demand system is first modeled, then simulated extensively on a large-scale asynchronous distributed simulator, and finally, the performance results are detailed.
650 10 $aMathematics.
650 0 $aMathematics.
650 0 $aComputer science$xMathematics.
650 24 $aComputational Mathematics and Numerical Analysis.
776 08 $iPrinted edition:$z9781461265382
988 $a20131119
906 $0VEN