جزییات کتاب
A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more. Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry. Complete with strategies for implementing security mechanisms and techniques, Network Security features: * State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures * Problems and solutions for a wide range of network technologies, from fixed point to mobile * Methodologies for real-time and non-real-time applications and protocolsContent: Chapter 1 Computer Network Security: Basic Background and Current Issues (pages 1–12): Panayiotis Kotzanikolaou and Dr. Christos DouligerisChapter 2 Secure Routing (pages 15–32): Ioannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy and Dr. Randy WangChapter 3 Designing Firewalls: A Survey (pages 33–49): Angelos D. Keromytis and Vassilis PrevelakisChapter 4 Security in Virtual Private Networks (pages 51–63): Dr. Srinivas SampalliChapter 5 IP Security (IPSec) (pages 65–82): Anirban Chakrabarti and Manimaran GovindarasuChapter 6 IDS for Networks (pages 83–97): John C. McEachen and John M. ZacharyChapter 7 Intrusion Detection Versus Intrusion Protection (pages 99–115): Luis Sousa CardosoChapter 8 Denial?of?Service Attacks (pages 117–134): Aikaterini Mitrokotsa and Christos DouligerisChapter 9 Secure Architectures with Active Networks (pages 135–151): Dr. Srinivas Sampalli, Yaser Haggag and Christian LabonteChapter 10 Security in E?Services and Applications (pages 157–177): Manish Mehta, Sachin Singh and Yugyung LeeChapter 11 Security in Web Services (pages 179–204): Christos Douligeris and Dr. George P. NiniosChapter 12 Secure Multicasting (pages 205–227): Dr. Constantinos Boukouvalas and Anthony G. PetropoulosChapter 13 Voice Over IP Security (pages 229–245): Son Vuong and Kapil Kumar SinghChapter 14 Grid Security (pages 247–256): Kyriakos Stefanidis, Artemios G. Voyiatzis and Dr. Dimitrios N. SerpanosChapter 15 Mobile Agent Security (pages 257–269): Panayiotis Kotzanikolaou, Dr. Christos Douligeris, Rosa Mavropodi and Vassilios ChrissikopoulosChapter 16 Mobile Terminal Security (pages 275–296): Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stephane Socie and Claire WhelanChapter 17 IEEE 802.11 Security (pages 297–312): Daniel L. Lough, David J. Robinson and Ian G. SchnellerChapter 18 Bluetooth Security (pages 313–329): Christian GehrmannChapter 19 Mobile Telecom Networks (pages 331–353): Christos Xenakis and Lazaros MerakosChapter 20 Security in Mobile Ad Hoc Networks (pages 355–374): Mike Burmester, Panayiotis Kotzanikolaou and Dr. Christos DouligerisChapter 21 Wireless Sensor Networks (pages 375–390): Artemios G. Voyiatzis and Dr. Dimitrios N. SerpanosChapter 22 Trust (pages 391–403): Lidong ChenChapter 23 PKI Systems (pages 409–418): Dr. Nikos KomninosChapter 24 Privacy in Electronic Communications (pages 419–440): Alf Zugenmaier and Joris ClaessensChapter 25 Securing Digital Content (pages 441–457): Magda M. Mourad and Ahmed N. Tantawy