Over the past decade, the number of networked devices has increased drastically. This increase has also been characterized by the advancement in network intrusion mechanisms. The traditional methods of network and data protection revolved around authentication protocols, cryptography, firewalls, proxy servers and physical protection. However, each of these technques has been compromized, leading to theft or manipulation of data. This book explores some of these mechanisms and shows how each of them falls short of the expectations for a secure network. A new architecture based on routing protocol transformation is suggested and implemented as a more secure approach to network security. This book is specifically dedicated to masters students in the fields of telecommunications and information egineering, electrical and electronics engineering, computer systems, software engineering and communication systems. The final students in the mentioned fields may also find this book instrumental in their project work.