Network Security Attacks and Countermeasures

Nonfiction, Computers, Networking & Communications, Computer Security, Application Software, General Computing
Cover of the book Network Security Attacks and Countermeasures by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466687639
Publisher: IGI Global Publication: January 18, 2016
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466687639
Publisher: IGI Global
Publication: January 18, 2016
Imprint: Information Science Reference
Language: English

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

More books from IGI Global

Cover of the book Handbook of Research on Security Considerations in Cloud Computing by
Cover of the book Environmental Sustainability and Climate Change Adaptation Strategies by
Cover of the book Electronic Business Interoperability by
Cover of the book Technical Education and Vocational Training in Developing Nations by
Cover of the book Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare by
Cover of the book Trends, Prospects, and Challenges in Asian E-Governance by
Cover of the book Promoting Socio-Economic Development through Business Integration by
Cover of the book Cases on Inquiry through Instructional Technology in Math and Science by
Cover of the book Handbook of Research on Expanding Business Opportunities With Information Systems and Analytics by
Cover of the book Recent Advances in Applied Thermal Imaging for Industrial Applications by
Cover of the book Computational Modeling and Simulation of Intellect by
Cover of the book Critical Assessment and Strategies for Increased Student Retention by
Cover of the book Comparative Perspectives on Civil Religion, Nationalism, and Political Influence by
Cover of the book Regional Innovation Systems and Sustainable Development by
Cover of the book Computer-Mediated Marketing Strategies by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy