Articles liés à Evolving Networking Technologies: Developments and...

Evolving Networking Technologies: Developments and Future Directions - Couverture rigide

 
9781119836209: Evolving Networking Technologies: Developments and Future Directions

Synopsis

EVOLVING NETWORKING TECHNOLOGIES

This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.

The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.

The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:

  • Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
  • Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
  • Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.

Audience

This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in international journals and conference proceedings.

Shaurya Gupta, PhD, is an assistant professor at the University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India. He completed his PhD in Information Technology from Amity University and has published research articles in international journals. His areas of interest are Delay Tolerant Networks, Wireless Sensor Networks, Ad Hoc Networks, IOT, and Machine Learning.

Ashish Sharma, PhD, is one of the key faculty members of the information retrieval and data mining group at GLA University, India. He has published many research papers in international journals, and his research interests are in the applications of data mining, machine learning, big data, business analytics, data/text mining, healthcare informatics, and service-oriented computing.

Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of the Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and image processing in biomedicine. He has over 50 publications and edited/authored 15 computer science books.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter D'occasion

état :  Comme neuf
Unread book in perfect condition...
Afficher cet article
EUR 183,52

Autre devise

EUR 17,31 expédition depuis Etats-Unis vers France

Destinations, frais et délais

Acheter neuf

Afficher cet article
EUR 170,26

Autre devise

EUR 5,58 expédition depuis Royaume-Uni vers France

Destinations, frais et délais

Résultats de recherche pour Evolving Networking Technologies: Developments and...

Image d'archives

Kanta Prasad Sharma
Edité par John Wiley and Sons, 2025
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

HRD. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur FW-9781119836209

Contacter le vendeur

Acheter neuf

EUR 170,26
Autre devise
Frais de port : EUR 5,58
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 15 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Gupta, Shaurya (EDT); Sharma, Kanta Prasad (EDT); Sharma, Ashish (EDT); Le, Dac-nhuong (EDT)
Edité par Wiley-Scrivener, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 42721870-n

Contacter le vendeur

Acheter neuf

EUR 170,24
Autre devise
Frais de port : EUR 17,34
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Sharma
Edité par John Wiley & Sons, 2025
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Gebunden. Etat : New. Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in interna. N° de réf. du vendeur 497471677

Contacter le vendeur

Acheter neuf

EUR 182,45
Autre devise
Frais de port : EUR 9,70
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Gupta, Shaurya (EDT); Sharma, Kanta Prasad (EDT); Sharma, Ashish (EDT); Le, Dac-nhuong (EDT)
Edité par Wiley-Scrivener, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 42721870-n

Contacter le vendeur

Acheter neuf

EUR 179,06
Autre devise
Frais de port : EUR 17,31
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Gupta, Shaurya (EDT); Sharma, Kanta Prasad (EDT); Sharma, Ashish (EDT); Le, Dac-nhuong (EDT)
Edité par Wiley-Scrivener, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Ancien ou d'occasion Couverture rigide

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 42721870

Contacter le vendeur

Acheter D'occasion

EUR 183,52
Autre devise
Frais de port : EUR 17,31
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Gupta, Shaurya (EDT); Sharma, Kanta Prasad (EDT); Sharma, Ashish (EDT); Le, Dac-nhuong (EDT)
Edité par Wiley-Scrivener, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Ancien ou d'occasion Couverture rigide

Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 42721870

Contacter le vendeur

Acheter D'occasion

EUR 184,35
Autre devise
Frais de port : EUR 17,34
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Edité par Wiley-Scrivener, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. In. N° de réf. du vendeur ria9781119836209_new

Contacter le vendeur

Acheter neuf

EUR 198,96
Autre devise
Frais de port : EUR 4,61
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Shaurya Gupta
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : CitiRetail, Stevenage, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Hardcover. Etat : new. Hardcover. EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points: Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from todays vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time. Audience This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. N° de réf. du vendeur 9781119836209

Contacter le vendeur

Acheter neuf

EUR 190,51
Autre devise
Frais de port : EUR 28,90
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image d'archives

Edité par Wiley-Scrivener, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : Majestic Books, Hounslow, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 392844375

Contacter le vendeur

Acheter neuf

EUR 225,17
Autre devise
Frais de port : EUR 10,23
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 3 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Kanta Prasad Sharma
Edité par Wiley Mai 2023, 2023
ISBN 10 : 1119836204 ISBN 13 : 9781119836209
Neuf Couverture rigide

Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Buch. Etat : Neu. Neuware - EVOLVING NETWORKING TECHNOLOGIESThis book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:\* Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.\* Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.\* Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.AudienceThis book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management. N° de réf. du vendeur 9781119836209

Contacter le vendeur

Acheter neuf

EUR 225,12
Autre devise
Frais de port : EUR 10,99
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

There are 4 autres exemplaires de ce livre sont disponibles

Afficher tous les résultats pour ce livre