Search Results: 'network attack'

Search

×
×
×
×
65 results for "network attack"
Security for Wireless AD HOC Networks By Farooq Anjum, Petros Mouchtaris
eBook (ePub): $105.00
Download immediately.
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication,... More > secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board.< Less
Global Networks of Power: Volume One By Garrison C. Gibson
Paperback: List Price: $29.95 $26.96 You Save: 10%
Ships in 3-5 business days
Global Networks of Power captures an image of social and political substance of 2011 to early 2012. The U.S. Government has made Orwellian hate crimes legislation a general lever to intervene in... More > politically incorrect crimes upon special classes, given the military the right to exfiltrate U.S. citizens without legal review to unspecified foreign torture facilities where they may disappear forever and has forced corporate medical insurance upon all citizens and sought to force all religious organizations to provide birth control paraphernalia to employees through insurers. Following the attack on the rich in the World Trade Center in 2001 American democracy has been progressively stifled and wealth concentrated with onerous public debt building up along with high unemployment. The need for ecological economic reforms are ignored and the government cannot even reform capitalism to benefit American individualism. Gary C. Gibson writes of contemporary affairs from his own point of view.< Less
Distributed Multi-Domain Network Survivability By Feng Xu
Hardcover: List Price: $19.33 $16.43 You Save: 15%
Ships in 6-8 business days.
As user services continue to grow, there is a growing need to improve network recovery across multiple domains. This is a complex problem due to scalability and privacy concerns across domains. Hence... More > multi-domain survivability schemes must operate in a distributed manner and also handle large multi-failure events, e.g., natural disasters, power outages, WMD attacks, etc. Now a wide range of recovery schemes have been developed for single domain networks, including pre-provisioned protection and post-fault restoration. However most multi-domain studies have only looked at protection strategies and do not handle multiple failures. To address these concerns, this work first proposes a new scheme to achieve improved protection with lower routing overheads. This scheme is then augmented with probabilistic features to handle multiple failures, and novel post-fault restoration methods proposed. Performance evaluation is then done using simulation and comparisons made with existing strategies.< Less
Black Book, Network Security, Ed. 10, Paperback, B&W By Ixia Product Management
Paperback: $8.60
Ships in 3-5 business days
Network Security - Network security is essential for homes, government organizations, and enterprises of all sizes. The number and types of attacks are enormous, and the devices used to defend... More > against them necessarily complex. This book provides an overview of network security and covers some of the test methodologies used to assess the effectiveness and performance impact of IPS/IDS, UTMs, and a new generation firewalls using attacks such as DoS/DDoS, as well as known vulnerabilities and malware. The last section of the book is dedicated on IPsec VPN test methodologies.< Less
Black Book, Network Security, Ed. 10, Paperback, Color By Ixia Product Management
Paperback: $46.05
Ships in 3-5 business days
Network Security - Network security is essential for homes, government organizations, and enterprises of all sizes. The number and types of attacks are enormous, and the devices used to defend... More > against them necessarily complex. This book provides an overview of network security and covers some of the test methodologies used to assess the effectiveness and performance impact of IPS/IDS, UTMs, and a new generation firewalls using attacks such as DoS/DDoS, as well as known vulnerabilities and malware. The last section of the book is dedicated on IPsec VPN test methodologies.< Less
•Design and Evaluation of Network Survivability Schemes for Correlated Multi-Failure Scenarios By Oscar Diaz
Hardcover: $19.38
Ships in 6-8 business days.
Computer network recovery from multiple correlated failures is a major concern given the increased level of infrastructure vulnerability to natural disasters, massive power failures, and malicious... More > attacks. In many cases, existing network recovery schemes cannot handle such scenarios as they are mostly designed for isolated single node and link failures. Hence in order to properly address this concern, improved network recovery schemes are needed based upon probabilistic failure models. This work presents some novel path protection algorithms along these lines to help minimize failure probabilities and also take into account well-known traffic engineering concerns. Network simulation is also used to evaluate the proposed solutions.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
Download immediately.
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
Cyber Infrastructure Protection By Tarek N. Saadawi, Louis H. Jordan Jr.
Paperback: $25.97
Ships in 3-5 business days
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a... More > roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.(Originally published by the Strategic Studies Institute)< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Ships in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Just Turn It Off By nCircle Vulnerability Exposure and Research Team
eBook (ePub): $0.00
Download immediately.
Businesses of all types are faced with the strong possibility of a security breach. No one is immune! Every network -- no matter how large or how small -- is ripe for attack. This book will show... More > you how to create an environment that’s harder for cyber criminals to attack by removing some of the low hanging fruit used to gain access to your network and data. nCircle has identified 12 different vulnerabilities that are both easy to address – and that present considerable risk to your security environment if left unaddressed. All of these identified risks can be immediately reduced by doing exactly what the title of this book suggests – just turning them off. There's no easier way to improve the security of your network.< Less