000 01297nam a2200217Ia 4500
003 RRU
005 20230502134107.0
008 210901s2002 ||||||||| ||||||| 0|eng|d
020 _a9780387952130
_c$68.95
040 _aRRU
_beng
041 _aEng.
082 _a005.8
_bGHO
100 _91972
_aGhosh, Sumit
245 0 _aPrinciples of Secure Network Systems Design
_cSumit Ghosh
_nForeword by Harold Lawson with 91 Figures
260 _bSpringer
_c2002
_aNew York
300 _a209p.
_b15.6 x 1.42 x 23.39 cm
520 _aA fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
650 0 _aComputer networks--Security measures
_91267
650 0 _aComputer security
_91346
942 _2ddc
_cBK
999 _c1707
_d1707