Aspects of Network and Information Security.
Material type: TextSeries: NATO Science for Peace and Security Series - D: Information and Communication SecurityPublisher: Amsterdam : IOS Press, 2008Copyright date: ©2008Description: 1 online resource (368 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781607503262Subject(s): Computer networks -- Security measures | Information networks -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Aspects of Network and Information SecurityDDC classification: 005.8 LOC classification: TK5105.59 -- .A87 2005ebOnline resources: Click to ViewTitle page -- Preface -- Contents -- Section I: Network Security -- Network security and survivability: using wireless overlay networks for critical infrastructure protection -- Security when routers are taken over by the adversary -- Security in quantum cryptography and quantum networks -- The case for self-healing software -- Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice -- Formal treatment of secure protocols: an introduction -- Behavioral and structural properties of malicious code -- Security from the practitioner's point of view -- Mobile and wireless communications security -- Humanitarian problems in information security -- Multimedia security: open problems and solutions -- A selective introduction to border gateway protocol (BGP) security issues -- Section II: Information Security -- Steganography & steganalysis an overview of research & challenges -- Guessing and cryptography -- The exact and approximate encryption of quantum information -- A new approach to stochastic quantum processes, their manipulation and control -- Reliability approach in Wiretapper guessing theory -- E-capacity of information hiding systems -- Quasicrystals in cryptography -- Asymptotic investigation of mutual information and capacity of certain communication channels -- Information theory of covert timing channels -- Section III: Coding -- A survey of new results in coding with feedback and searching with lies -- Remarks on E-optimal rate function in DMS coding -- Reconstruction of data distorted by some errors -- On (w,r) cover-free codes -- Switching methods for error-correcting codes -- On reconstruction of functions on the hypercube -- Index -- Author index.
Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorised data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. Topics in network security, information security and coding are discussed in this volume.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.