Skip to main content

Network Security

  • Book
  • © 2010

Overview

  • Contains the most current techniques and advances in network security

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (11 chapters)

Keywords

About this book

Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the ?eld of network security. This book contains 11 r- ereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff m- bers from Springer for publishing this work. Besides, we would like to dedicate this book to our families.

Editors and Affiliations

  • , Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong/PR China

    Scott C.-H. Huang

  • , Computer Science and Engineering, University of Minnesota, Minneapolis, USA

    David MacCallum

  • Erik Jonsson School of Engineering &, Computer Science, University of Texas, Dallas, Richardson, USA

    Ding-Zhu Du

Bibliographic Information

Publish with us