A fundamental, comprehensive framework for network security which may be used by the military, government, industry, and academia network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. This book is intended for researchers and graduate students in computer science and engineering, specializing in network security, practitioners in network security, and architects and policy makers for large-scale network infrastructure.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Anybook.com, Lincoln, Royaume-Uni
Etat : Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9780387952130. N° de réf. du vendeur 9377015
Quantité disponible : 1 disponible(s)
Vendeur : Ammareal, Morangis, France
Hardcover. Etat : Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations. N° de réf. du vendeur E-551-369
Quantité disponible : 1 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. pp. 240, Maps. N° de réf. du vendeur 262170689
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. pp. 240 Illus., Maps. N° de réf. du vendeur 5677214
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. pp. 240. N° de réf. du vendeur 182170699
Quantité disponible : 4 disponible(s)
Vendeur : GoldBooks, Denver, CO, Etats-Unis
Etat : new. N° de réf. du vendeur 20X94_62_0387952136
Quantité disponible : 1 disponible(s)
Vendeur : Romtrade Corp., STERLING HEIGHTS, MI, Etats-Unis
Etat : New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. N° de réf. du vendeur ABNR-90197
Quantité disponible : 1 disponible(s)
Vendeur : Basi6 International, Irving, TX, Etats-Unis
Etat : Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. N° de réf. du vendeur ABEOCT25-85963
Quantité disponible : 1 disponible(s)
Vendeur : CURIO, Cleethorpes, North East Lincolnshire, Royaume-Uni
Hardcover. Etat : Very Good. No Jacket. 1st Edition. First Edition / First Print (number line on copyright page 9 8 7 6 5 4 3 2 1). Hardback copy in pictorial boards, no dustjacket as issued. 209pp. B/w charts and graphs throughout. Light wear to board edges. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. (22/1). N° de réf. du vendeur ABE-1639236967731
Quantité disponible : 4 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 672042-n
Quantité disponible : Plus de 20 disponibles