rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781586038564

Aspects of Network and Information Security

by ; ;
  • ISBN13:

    9781586038564

  • ISBN10:

    1586038567

  • Format: Hardcover
  • Copyright: 2008-07-15
  • Publisher: Ios Pr Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $167.00 Save up to $48.01
  • Rent Book $118.99
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Aspects of Network and Information Security [ISBN: 9781586038564] for the semester, quarter, and short term or search our site for other textbooks by Kranakis, Evangelos; Haroutunian, Evgueni; Shahbazian, Elisa. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network.Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unA01ized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. Topics in network security, information security and coding are discussed in this volume.

Table of Contents

Prefacep. v
Network Security
Network security and survivability: using wireless overlay networks for critical infrastructure protectionp. 3
Security when routers are taken over by the adversaryp. 10
Security in quantum cryptography and quantum networksp. 19
The case for self-healing softwarep. 47
Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice"p. 56
Formal treatment of secure protocols: an introductionp. 74
Behavioral and structural properties of malicious codep. 92
Security from the practitioner's point of viewp. 110
Mobile and wireless communications securityp. 119
Humanitarian problems in information securityp. 134
Multimedia security: open problems and solutionsp. 143
A selective introduction to border gateway protocol (BGP) security issuesp. 152
Information Security
Steganography & steganalysis an overview of research & challengesp. 179
Guessing and cryptographyp. 211
The exact and approximate encryption of quantum informationp. 218
A new approach to stochastic quantum processes, their manipulation and controlp. 234
Reliability approach in Wiretapper guessing theoryp. 248
E-capacity of information hiding systemsp. 261
Quasicrystals in cryptographyp. 274
Asymptotic investigation of mutual information and capacity of certain communication channelsp. 283
Information theory of covert timing channelsp. 292
Coding
A survey of new results in coding with feedback and searching with liesp. 299
Remarks on E-optimal rate function in DMS codingp. 308
Reconstruction of data distorted by some errorsp. 315
On (w, r) cover-free codesp. 324
Switching methods for error-correcting codesp. 333
On reconstruction of functions on the hypercubep. 343
Indexp. 351
Author indexp. 355
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program