Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
Software-Defined Networking and Security
From Theory to Practice
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
Software-Defined Networking and Security
From Theory to Practice
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense.
Andere Kunden interessierten sich auch für
- Greg SchulzCloud and Virtual Data Storage Networking168,99 €
- Andrew BoyarskyRiding the Wave157,99 €
- Lee ChaoNetworking Systems Design and Development156,99 €
- Blockchain, Iot, and AI Technologies for Supply Chain Management142,99 €
- Michael LandSecurity Management135,99 €
- Kai Mertins / Rainer Ruggaber / Keith Popplewell / Xiaofei Xu (eds.)Enterprise Interoperability III221,99 €
- Machine Learning and Systems Engineering148,99 €
-
-
-
This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 356
- Erscheinungstermin: 13. Dezember 2018
- Englisch
- Abmessung: 163mm x 240mm x 27mm
- Gewicht: 635g
- ISBN-13: 9780815381143
- ISBN-10: 081538114X
- Artikelnr.: 54029226
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: CRC Press
- Seitenzahl: 356
- Erscheinungstermin: 13. Dezember 2018
- Englisch
- Abmessung: 163mm x 240mm x 27mm
- Gewicht: 635g
- ISBN-13: 9780815381143
- ISBN-10: 081538114X
- Artikelnr.: 54029226
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Dr. Dijiang Huang received his Bachelor of Science degree in Telecommunications from Beijing University of Posts and Telecommunications, China. He received his Master of Science and PhD degrees from University of Missouri-Kansas City, majoring in Computer Science and Telecommunications. He is currently an associate professor at the School of Computing Informatics, and Decision Systems Engineering, at Arizona State University. Dijiang's research interests are in computer and network security, mobile ad hoc networks, network virtualization, and mobile cloud computing. His research is supported by federal agencies NSF, ONR, ARO, and NATO, and organizations such as Consortium of Embedded System (CES), Hewlett-Packard, and China Mobile. He is a recipient of ONR Young Investigator Award and HP Innovation Research Program (IRP) Award. He is a co-founder of Athena Network Solutions LLC (ATHENETS), and is currently leading the Secure Networking and Computing (SNAC) research group at ASU. Ankur Chowdhary is a PhD Student at ASU. He received a B.Tech in Information Technology from GGSIPU in 2011 and MS in Computer Science from ASU in 2015. He has worked as an Information Security Researcher for Blackberry Ltd., RSG, and an Application Developer for CSC Pvt. Ltd. His research interests include SDN, Web Security, Network Security, and application of Machine Learning in field of Security. Dr. Sandeep Pisharody received a B.S. degree in Electrical Engineering (distinction), a B.S. degree in Computer Engineering (distinction) from the University of Nebraska in 2004, and an M.S. degree in Electrical Engineering from the University of Nebraska in 2006. He completed his PhD in Computer Science (Information Assurance) from Arizona State University under the guidance of Dr. Dijiang Huang in 2017. His current research interests lie in the areas of secure cloud computing, network security, and Software-Defined Networking. Previously, Sandeep has over eight years' experience in designing, building, maintaining and securing enterprise and carrier class networks, while working in various capacities for Sprint, Iveda, Apollo Education Group, Insight, University of Phoenix, and the US Government.
Part I: Computer Network Foundation. Introduction. Network Interconnection.
Virtual Network. SDN and NFV. Part II: Network Security Foundation.
Network Security Preliminary. Firewalls. Network Intrusion Detection.
Penetration and Testing. Authentication and Access Control. Part III:
Advanced Topics in Network Security. Moving Target Defense (MTD). Attack
Representation. Attack Mitigation Techniques. Countermeasure Analysis.
Advanced Topics. Lab Book: ThoTh Lab (hosted online at ASU). Introduction
of ThoTh Lab. Network Security. Software Defined Networking. Network
Function Virtualization. Appendix: Source Codes of SDN and MTD Schemes.
Virtual Network. SDN and NFV. Part II: Network Security Foundation.
Network Security Preliminary. Firewalls. Network Intrusion Detection.
Penetration and Testing. Authentication and Access Control. Part III:
Advanced Topics in Network Security. Moving Target Defense (MTD). Attack
Representation. Attack Mitigation Techniques. Countermeasure Analysis.
Advanced Topics. Lab Book: ThoTh Lab (hosted online at ASU). Introduction
of ThoTh Lab. Network Security. Software Defined Networking. Network
Function Virtualization. Appendix: Source Codes of SDN and MTD Schemes.
Part I: Computer Network Foundation. Introduction. Network Interconnection.
Virtual Network. SDN and NFV. Part II: Network Security Foundation.
Network Security Preliminary. Firewalls. Network Intrusion Detection.
Penetration and Testing. Authentication and Access Control. Part III:
Advanced Topics in Network Security. Moving Target Defense (MTD). Attack
Representation. Attack Mitigation Techniques. Countermeasure Analysis.
Advanced Topics. Lab Book: ThoTh Lab (hosted online at ASU). Introduction
of ThoTh Lab. Network Security. Software Defined Networking. Network
Function Virtualization. Appendix: Source Codes of SDN and MTD Schemes.
Virtual Network. SDN and NFV. Part II: Network Security Foundation.
Network Security Preliminary. Firewalls. Network Intrusion Detection.
Penetration and Testing. Authentication and Access Control. Part III:
Advanced Topics in Network Security. Moving Target Defense (MTD). Attack
Representation. Attack Mitigation Techniques. Countermeasure Analysis.
Advanced Topics. Lab Book: ThoTh Lab (hosted online at ASU). Introduction
of ThoTh Lab. Network Security. Software Defined Networking. Network
Function Virtualization. Appendix: Source Codes of SDN and MTD Schemes.