skip to content
Principles of Secure Network Systems Design Preview this item
ClosePreview this item
Checking...

Principles of Secure Network Systems Design

Author: Sumit Ghosh
Publisher: New York, NY : Springer New York, 2002.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Sumit Ghosh
ISBN: 9781461300298 1461300290 0387952136 9780387952130
OCLC Number: 852791420
Description: 1 online resource (xxvi, 209 pages 91 illustrations)
Contents: History of network security and growing interest --
Principles of secure network design --
A fundamental framework for network security --
User-level security on demand in ATM networks: a new paradigm --
The concept of node status indicator (NSI) and performance analysis --
Mixed use networks --
Vulnerability analysis and synthesis of security attacks in ATM networks --
Network topology, performance, and security issues --
Inherent self healing in networks --
Future issues in network security.
Responsibility: by Sumit Ghosh.

Abstract:

A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel.  Read more...

Reviews

Editorial reviews

Publisher Synopsis

From the reviews:?Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/852791420> # Principles of Secure Network Systems Design
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "852791420" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/37468222#Place/new_york_ny> ; # New York, NY
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nyu> ;
    schema:about <http://id.worldcat.org/fast/1012163> ; # Mathematics
    schema:about <http://dewey.info/class/518/e23/> ;
    schema:about <http://id.worldcat.org/fast/872460> ; # Computer science--Mathematics
    schema:about <http://id.loc.gov/authorities/subjects/sh85042295> ; # Computer science--Mathematics
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/37468222#Person/ghosh_sumit> ; # Sumit Ghosh
    schema:datePublished "2002" ;
    schema:description "This new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. An integrated, security-on-demand system is first modeled, then simulated extensively on a large-scale asynchronous distributed simulator, and finally, the performance results are detailed."@en ;
    schema:description "History of network security and growing interest -- Principles of secure network design -- A fundamental framework for network security -- User-level security on demand in ATM networks: a new paradigm -- The concept of node status indicator (NSI) and performance analysis -- Mixed use networks -- Vulnerability analysis and synthesis of security attacks in ATM networks -- Network topology, performance, and security issues -- Inherent self healing in networks -- Future issues in network security."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/37468222> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/37468222#CreativeWork/> ;
    schema:name "Principles of Secure Network Systems Design"@en ;
    schema:productID "852791420" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/852791420#PublicationEvent/new_york_ny_springer_new_york_2002> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/37468222#Agent/springer_new_york> ; # Springer New York
    schema:url <http://link.springer.com/10.1007/978-1-4613-0029-8> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-0-387-95213-0> ;
    schema:url <http://dx.doi.org/10.1007/978-1-4613-0029-8> ;
    schema:workExample <http://worldcat.org/isbn/9780387952130> ;
    schema:workExample <http://worldcat.org/isbn/9781461300298> ;
    schema:workExample <http://dx.doi.org/10.1007/978-1-4613-0029-8> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/852791420> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/37468222#Agent/springer_new_york> # Springer New York
    a bgn:Agent ;
    schema:name "Springer New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/37468222#Person/ghosh_sumit> # Sumit Ghosh
    a schema:Person ;
    schema:familyName "Ghosh" ;
    schema:givenName "Sumit" ;
    schema:name "Sumit Ghosh" ;
    .

<http://id.loc.gov/authorities/subjects/sh85042295> # Computer science--Mathematics
    a schema:Intangible ;
    schema:name "Computer science--Mathematics"@en ;
    .

<http://id.worldcat.org/fast/1012163> # Mathematics
    a schema:Intangible ;
    schema:name "Mathematics"@en ;
    .

<http://id.worldcat.org/fast/872460> # Computer science--Mathematics
    a schema:Intangible ;
    schema:name "Computer science--Mathematics"@en ;
    .

<http://worldcat.org/entity/work/data/37468222#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/852791420> ; # Principles of Secure Network Systems Design
    .

<http://worldcat.org/isbn/9780387952130>
    a schema:ProductModel ;
    schema:isbn "0387952136" ;
    schema:isbn "9780387952130" ;
    .

<http://worldcat.org/isbn/9781461300298>
    a schema:ProductModel ;
    schema:isbn "1461300290" ;
    schema:isbn "9781461300298" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.