Network_Security.pdf
(
3109 KB
)
Pobierz
Network Security
Scott C.-H. Huang
Ding-Zhu Du
Editors
David MacCallum
Network Security
123
Editors
Scott C.-H. Huang
Department of Computer Science
City University of Hong Kong
Tat Chee Avenue 83
Hong Kong
Hong Kong SAR
shuang@cityu.edu.hk
David MacCallum
Department of Computer Science
& Engineering
University of Minnesota
Union Street SE., 200
55455-0000 Minneapolis
Minnesota
4-192 EE/CS Bldg.
USA
Ding-Zhu Du
Department of Computer Science
University of Texas, Dallas
Erik Jonsson School of Engineering
& Computer Science
W. Campbell Road 800
75080 Richardson Texas
USA
dzdu@utdallas.edu
ISBN 978-0-387-73820-8
e-ISBN 978-0-387-73821-5
DOI 10.1007/978-0-387-73821-5
Springer New York Dordrecht Heidelberg London
Library of Congress Control Number: 2010930848
c Springer Science+Business Media, LLC 2010
All rights reserved. This work may not be translated or copied in whole or in part without the written
permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York,
NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in
connection with any form of information storage and retrieval, electronic adaptation, computer software,
or by similar or dissimilar methodology now known or hereafter developed is forbidden.
The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are
not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject
to proprietary rights.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
Over the past two decades, network technologies have been remarkably renovated
and computer networks, particularly the Internet, have permeated into every facet
of our daily lives. These changes also brought about new challenges, particularly in
the area of security. Network security is essential to protect data integrity, confiden-
tiality, access control, authentication, user privacy, and so on. All of these aspects
are critical to provide fundamental network functionalities.
This book covers a comprehensive array of topics in network security including
secure metering, group key management, DDoS attacks, and many others. It can
be used as a handy reference book for researchers, educators, graduate students, as
well as professionals in the field of network security. This book contains 11 ref-
ereed chapters from prominent researchers working in this area around the globe.
Although these selected topics could not cover every aspect, they do represent the
most fundamental and practical techniques.
This book has been made possible by the great efforts and contributions of many
people. First, we thank the authors of each chapter for contributing informative and
insightful chapters. Then, we thank all reviewers for their invaluable comments and
suggestions that improved the quality of this book. Finally, we thank the staff mem-
bers from Springer for publishing this work. Besides,
we would like to dedicate this
book to our families.
City University of Hong Kong, Hong Kong SAR
University of Minnesota, USA
University of Texas at Dallas, USA
Scott C.-H. Huang
David MacCallum
Ding-Zhu Du
v
Plik z chomika:
krzysiek314151
Inne pliki z tego folderu:
ten-steps-to-linux-survival.pdf
(6347 KB)
The_Browser_Hackers_Handbook.pdf
(30227 KB)
The_Hackers_Handbook.pdf
(18505 KB)
trends-shaping-the-london-tech-scene.epub
(4760 KB)
trends-shaping-the-london-tech-scene.mobi
(10009 KB)
Inne foldery tego chomika:
Zgłoś jeśli
naruszono regulamin