Logo - springer
Slogan - springer

New & Forthcoming Titles | Network Infrastructure Security

Network Infrastructure Security

Wong, Angus, Yeung, Alan

2009, XIV, 266p. 10 illus..

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$89.99

(net) price for USA

ISBN 978-1-4419-0166-8

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$119.00

(net) price for USA

ISBN 978-1-4419-0165-1

free shipping for individuals worldwide

online orders shipping within 2-3 days.


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$119.00

(net) price for USA

ISBN 978-1-4419-5492-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Provides an overview of network infrastructure security in a market with few books focusing specifically on the protection of network infrastructure rather than data integrity
  • Includes numerous visually-accessible examples of how attacks are implemented in a testing network
  • Covers such topics as switching security, routing security, and address configuration and naming

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.

Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field.

Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.

About the authors

Angus Kin-Yeung Wong obtained his BSc and PhD degrees from City University of Hong Kong and is currently an associate professor at Macao Polytechnic Institute. Alan Kai-Hau Yeung obtained his BSc and PhD degrees from the Chinese University of Hong Kong and is currently an associate professor at City University of Hong Kong. Wong and Yeung have been collaborating in network-related research for over 10 years.

Content Level » Professional/practitioner

Keywords » Bridge - Cryptography - Data Confidentiality - Data Link - Information Assurance - Infrastructure - Internet - Network - Router - Routing - Switch - TCP/IP - configuration - data security - security

Related subjects » Communication Networks

Table of contents 

to Network Infrastructure Security.- Network Infrastructure Security ’ Switching.- Network Infrastructure Security – Routing.- Network Infrastructure Security ’ Address Configuration and Naming.- Experiments for Illustrating Network Infrastructure Attacks.- Protecting Network Infrastructure – A New Approach.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Engineering.