000 | 01297nam a2200217Ia 4500 | ||
---|---|---|---|
003 | RRU | ||
005 | 20230502134107.0 | ||
008 | 210901s2002 ||||||||| ||||||| 0|eng|d | ||
020 |
_a9780387952130 _c$68.95 |
||
040 |
_aRRU _beng |
||
041 | _aEng. | ||
082 |
_a005.8 _bGHO |
||
100 |
_91972 _aGhosh, Sumit |
||
245 | 0 |
_aPrinciples of Secure Network Systems Design _cSumit Ghosh _nForeword by Harold Lawson with 91 Figures |
|
260 |
_bSpringer _c2002 _aNew York |
||
300 |
_a209p. _b15.6 x 1.42 x 23.39 cm |
||
520 | _aA fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. | ||
650 | 0 |
_aComputer networks--Security measures _91267 |
|
650 | 0 |
_aComputer security _91346 |
|
942 |
_2ddc _cBK |
||
999 |
_c1707 _d1707 |