Logo

Security of Networks and Services in an All-Connected World

Large book cover: Security of Networks and Services in an All-Connected World

Security of Networks and Services in an All-Connected World
by

Publisher: Springer
ISBN-13: 9783319607740
Number of pages: 204

Description:
Topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Cyber Infrastructure ProtectionCyber Infrastructure Protection
by - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(13285 views)
Book cover: The Developer Highway CodeThe Developer Highway Code
by - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(21159 views)
Book cover: Passwords: Guised Indispensable's or Liabilities?Passwords: Guised Indispensable's or Liabilities?
by
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
(7619 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(23531 views)