Search "network security"

Cole, Eric - Network Security Bible, ebook

Network Security Bible

Cole, Eric


The comprehensive A-to-Z guide on network security, fully revised and updated
Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network

Lin, Chuang - Security in Network Coding, ebook

Security in Network Coding

Lin, Chuang


Table of contents
1. Introduction
Peng Zhang, Chuang Lin
2. Security Threats in Network Coding
Peng Zhang, Chuang Lin
3. Subspace Authentication for Random Linear Network Coding
Peng Zhang, Chuang Lin
4. Lightweight Encryption for Random Linear Network Coding
Peng Zhang, Chuang Lin
5. Anonymous

Gregg, Michael - The Network Security Test Lab: A Step-by-Step Guide, ebook

The Network Security Test Lab: A Step-by-Step Guide

Gregg, Michael


The ultimate hands-on guide to IT security and proactive defense
The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies,

Khan, Shafiullah - Wireless Networks and Security, ebook

Wireless Networks and Security

Khan, Shafiullah


Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead
M. A. Razzaque, Ahmad Salehi S., Seyed M. Cheraghi
5. Security Issues and Approaches on Wireless M2M Systems
Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva
6. Security and

Jajodia, Sushil - Network Security Metrics, ebook

Network Security Metrics

Jajodia, Sushil


Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks
Marcel Frigault, Lingyu Wang, Sushil Jajodia, Anoop Singhal
2. Refining CVSS-Based Network

Dai, Huaiyu - Dynamic Games for Network Security, ebook

Dynamic Games for Network Security

Dai, Huaiyu


Dynamic Security Games with Extra Information
Xiaofan He, Huaiyu Dai
4. Dynamic Security Games with Incomplete Information
Xiaofan He, Huaiyu Dai
5. Dynamic Security Games with

Huang, Scott C.-H. - Network Security, ebook

Network Security

Huang, Scott C.-H.


Routing Security in Ad Hoc Wireless Networks
Mohammad O. Pervaiz, Mihaela Cardei, Jie Wu
7. Insider Threat Assessment: Model, Analysis and Tool
Ramkumar Chinchani, Duc Ha, Anusha Iyer, Hung Q. Ngo, Shambhu Upadhyaya
8. Toward Automated Intrusion Alert