26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

Over the past decade, the number of networked devices has increased drastically. This increase has also been characterized by the advancement in network intrusion mechanisms. The traditional methods of network and data protection revolved around authentication protocols, cryptography, firewalls, proxy servers and physical protection. However, each of these technques has been compromized, leading to theft or manipulation of data. This book explores some of these mechanisms and shows how each of them falls short of the expectations for a secure network. A new architecture based on routing…mehr

Produktbeschreibung
Over the past decade, the number of networked devices has increased drastically. This increase has also been characterized by the advancement in network intrusion mechanisms. The traditional methods of network and data protection revolved around authentication protocols, cryptography, firewalls, proxy servers and physical protection. However, each of these technques has been compromized, leading to theft or manipulation of data. This book explores some of these mechanisms and shows how each of them falls short of the expectations for a secure network. A new architecture based on routing protocol transformation is suggested and implemented as a more secure approach to network security. This book is specifically dedicated to masters students in the fields of telecommunications and information egineering, electrical and electronics engineering, computer systems, software engineering and communication systems. The final students in the mentioned fields may also find this book instrumental in their project work.
Autorenporträt
Vincent Omollo Nyangaresi holds BSC (Telecommunication & Info Engineering), Msc (Telecommunication & Info Engineering) and is currently pursuing his PhD in Information Technology Security & Audit. He is a lecturer in areas of data communication and computer networks, network design & information systems security among others.