Network Security. Current Status and Future Directions



Similar documents
NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

IEEE Press 445 Hoes Lane Piscataway, NJ IEEE Press Editorial Board Mohamed E. El-Hawary, Editor in Chief

Network Security Current Status and Future Directions

Analysis of the Global Enterprise Firewall Market

World Wireless Protocol Analyzers and Network Monitoring Systems

IP VPN Market Forecast in India to 2016

World Enterprise, Broadband, Mobile Video Transcoders Market

Global Big Data Analytics Market for Test and Measurement

Strategic Global Sourcing Best Practices

Administering Data Centers. Servers, Storage, and Voice over IP

U.S. Call Center Software Markets

Project Scheduling and Management for Construction. 4th Edition. RSMeans

Wireless Mobile Internet Security. 2nd Edition

Next Generation Enterprise Mobility Management Market Insight

2015 U.S. Technical and Trade Schools Industry - Industry Report

Converged Network Architectures. Delivering Voice over IP, ATM, and Frame Relay

"Personal Accident and Health Insurance Claims and Expenses in Morocco to 2018: Market Databook"

Brochure More information from

Strategic Analysis of the Impact of Big Data on the European and North American Automotive Industry

The Practical Guide to Project Management Documentation

Global Multiple Sclerosis Epidemiology and Patient Flow Analysis

BP p.l.c. (BP) Company Profile- Business Overview, Strategies, SWOT and Financial Analysis

Global Multiple Myeloma Epidemiology and Patient Flow Analysis

Global Haemophilia Epidemiology and Patient Flow Analysis

Enterprise VoIP - Future Potential of the Indian Market for Managed VoIP Solutions

Europe Rheumatoid Arthritis Market Highlights

'Personal Accident and Health Insurance Premiums and Claims in Australia to 2018: Market Brief' contains

Public Cloud Computing Market for SMBs in India - Affordable Connectivity and Virtualization Technologies to Drive Adoption of Public Cloud

Essentials of Working Capital Management. Essentials Series

Personal Accident and Health Insurance Investments in Russia to 2018: Market Databook

ZOHO Company Profile, focussing on CRM Activities

Personal Accident and Health Insurance Claims and Expenses in Belarus to 2016: Market Databook

'Personal Accident and Health Insurance Premiums and Claims in Kenya to 2018: Market Brief' contains

Global Opioid Dependence Drugs Market Highlights

Forms 1099 & W-9 Update - Current Year IRS Information Reporting Form Guidelines - Recorded Webinar

VoIP. Wireless, P2P and New Enterprise Voice over IP

Global Big Data Analytics Market

Personal Accident and Health Insurance Claims and Expenses in South Africa to 2017: Market Databook

Non-Life Insurance Premiums and Claims in Georgia to 2017: Market Brief

Saudi Cable Company Company Profile - Business Description, Strategies and SWOT Analysis

Non-Life Insurance Premiums and Claims in Brazil to 2018: Market Brief

Premiere Global Services, Inc. Company Profile - Business Description, Strategies, SWOT and Financial Analysis

Genesis Oil & Gas Consultants Ltd Company Profile - Business Description, Strategies and SWOT Analysis

Jindal Steel & Power Ltd (JSPL) Company Profile- Business Overview, Key Strategies, Operations and SWOT

Business Intelligence and the Cloud. Strategic Implementation Guide. Wiley and SAS Business Series

Enbridge Energy Management, L.L.C. Company Profile - Business Description, Strategies and SWOT Analysis

VASCO Data Security International, Inc Company Profile - Business Description, Strategies, SWOT and Financial Analysis

Corinthian Colleges Inc. Company Profile - Business Description, Strategies, SWOT and Financial Analysis

Vulnerability Management (VM) - Global Market Analysis

Global Physical Security Information Management Market Assessment

London Stock Exchange Group PLC Company Profile - Business Description, Strategies, SWOT and Financial Analysis

Miclyn Express Offshore Limited Company Profile - Business Description, Strategies and SWOT Analysis

Cloud Infrastructure Testing and Cloud-based Application Performance Monitoring Market

Mangalore Electricity Supply Company LimitedCompany Profile - Business Description, Strategies and SWOT Analysis

Port of Melbourne CorporationCompany Profile - Business Description, Strategies and SWOT Analysis

Effective Software Project Management

Individual Life Insurance in Indonesia to 2019: Market Databook

EMR - Emerson Electric CoCompany Profile - Business Description, Strategies and SWOT Analysis

The Fundamentals of Organizational Behavior. What Managers Need to Know

Brochure More information from

The Laboratory Quality Assurance System. A Manual of Quality Procedures and Forms. 3rd Edition

Predictive Analytics for Human Resources. Wiley and SAS Business Series

Top ICT spenders in the Indian Insurance Industry - Estimated ICT budget breakdowns in 2013

Risk and Financial Management in Construction

U.S. Mobile Device Management (MDM) Market 2012: Solving the Many Challenges in Enterprise Mobility

Analysis of the North American Automotive Wire and Cable Materials Market: Price-performance Index of Materials Will be Key in Driving Growth

Epidemiology Foundations. The Science of Public Health. Public Health/Epidemiology and Biostatistics

Individual Life Insurance in Russia to 2016: Market Databook

Compagnie Ivoirienne d'electricite Company Profile - Business Description, Strategies and SWOT Analysis

Empresa Petrolera Andina SA Company Profile - Business Description, Strategies and SWOT Analysis

European Electronic Medical Records (EMR) Markets

The Boston Consulting Group - Strategic SWOT Analysis Review

Maersk Olie og Gas ASCompany Profile - Business Description, Strategies and SWOT Analysis

Nederlandse Aardolie Maatschappij BVCompany Profile - Business Description, Strategies and SWOT Analysis

Strategic Analysis of Fleet Vehicle Leasing Market in Ireland

Trends and Opportunities in the UAE Life Insurance Industry to 2016: Market Profile

North America Insurance Market Outlook to US Insurance Market Headstarting the Lost Momentum

World Voice-over Internet Protocol (VoIP) Services Market

General Dynamics Corporation - Mergers & Acquisitions (M&A), Partnerships & Alliances and Investment Report

A User's Manual to the PMBOK Guide. 2nd Edition

CCJ - Cameco CorpCompany Profile - Business Description, Strategies and SWOT Analysis

Western European Storage Area Network (SAN) Market

North American VoIP Access and SIP Trunking Services Market 2012: Broader Market Acceptance Drives Robust Growth

Global and Chinese Polypropylene carbonate (PPC) Industry

Insights into Big Data and Analytics in Brazil

Transcription:

Brochure More information from http://www.researchandmarkets.com/reports/2175769/ Network Security. Current Status and Future Directions Description: A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more. Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry. Complete with strategies for implementing security mechanisms and techniques, Network Security features: State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures Problems and solutions for a wide range of network technologies, from fixed point to mobile Methodologies for real-time and non-real-time applications and protocols Contents: Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some Terminology on Network Security. 1.2 ISO/OSI Reference Model for Networks. 1.3 Network Security Attacks. 1.4 Mechanisms and Controls for Network Security: Book Overview and Structure. Part One Internet Security. 2. Secure Routing (Ioannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy, and Randy Wang). 2.1 Introduction. 2.2 Networking Technologies. 2.3 Attacks in Networks. 2.4 State of the Art. 2.5 Conclusion and Research Issues.

3. Designing Firewalls: A Survey (Angelos D. Keromytis and Vassilis Prevelakis). 3.1 Introduction. 3.2 Firewall Classifi cation. 3.3 Firewall Deployment: Management. 3.4 Conclusions. 4. Security in Virtual Private Networks (Srinivas Sampalli). 4.1 Introduction. 4.2 VPN Overview. 4.3 VPN Benefi ts. 4.4 VPN Terminology. 4.5 VPN Taxonomy. 4.6 IPSec. 4.7 Current Research on VPNs. 4.8 Conclusions. 5. IP Security (IPSec) (Anirban Chakrabarti and Manimaran Govindarasu). 5.1 Introduction. 5.2 IPSec Architecture and Components. 5.3 Benefi ts and Applications of IPSec. 5.4 Conclusions. 6. IDS for Networks (John C. McEachen and John M. Zachary). 6.1 Introduction. 6.2 Background. 6.3 Modern NIDSs. 6.4 Research and Trends. 6.5 Conclusions. 7. Intrusion Detection Versus Intrusion Protection (Luis Sousa Cardoso). 7.1 Introduction. 7.2 Detection Versus Prevention.

7.3 Intrusion Prevention Systems: The Next Step in Evolution of IDS. 7.4 Architecture Matters. 7.5 IPS Deployment. 7.6 IPS Advantages. 7.7 IPS Requirements: What to Look For. 7.8 Conclusions. 8. Denial-of-Service Attacks (Aikaterini Mitrokotsa and Christos Douligeris). 8.1 Introduction. 8.2 DoS Attacks. 8.3 DDoS Attacks. 8.4 DDoS Defense Mechanisms. 8.5 Conclusions. 9. Secure Architectures with Active Networks (Srinivas Sampalli, Yaser Haggag, and Christian Labonte). 9.1 Introduction. 9.2 Active Networks. 9.3 SAVE Test bed. 9.4 Adaptive VPN Architecture with Active Networks. 9.5 (SAM) Architecture. 9.6 Conclusions. Part Two Secure Services. 10. Security in E-Services and Applications (Manish Mehta, Sachin Singh, and Yugyung Lee). 10.1 Introduction. 10.2 What Is an E-Service? 10.3 Security Requirements for EServices and Applications. 10.4 Security for Future EServices. 11. Security in Web Services (Christos Douligeris and George P. Ninios). 11.1 Introduction.

11.2 Web Services Technologies and Standards. 11.3 Web Services Security Standard. 11.4 Conclusions. 12. Secure Multicasting (Constantinos Boukouvalas and Anthony G. Petropoulos). 12.1 Introduction 205 12.2 IP Multicast. 12.3 Application Security Requirements. 12.4 Multicast Security Issues. 12.5 Data Authentication. 12.6 Source Authentication Schemes. 12.7 Group Key Management. 12.8 Group Management and Secure Multicast Routing. 12.9 Secure IP Multicast Architectures. 12.10 Secure IP Multicast Standardization Efforts. 12.11 Conclusions. 13. Voice Over IP Security (Son Vuong and Kapil Kumar Singh). 13.1 Introduction. 13.2 Security Issues in VoIP. 13.3 Vulnerability Testing. 13.4 Intrusion Detection Systems. 13.5 Conclusions. 14. Grid Security (Kyriakos Stefanidis, Artemios G. Voyiatzis, and Dimitrios N. Serpanos). 14.1 Introduction. 14.2 Security Challenges for Grids. 14.3 Grid Security Infrastructure. 14.4 Grid Computing Environments. 14.5 Grid Network Security. 14.6 Conclusions and Future Directions.

15. Mobile Agent Security (Panayiotis Kotzanikolaou, Christos Douligeris, Rosa Mavropodi, and Vassilios Chrissikopoulos). 15.1 Introduction. 15.2 Taxonomy of Solutions. 15.3 Security Mechanisms for Mobile Agent Systems. References Part Three Mobile and Security. 16. Mobile Terminal Security (Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, and Claire Whelan). 16.1 Introduction. 16.2 WLAN and WPAN Security. 16.3 GSM and 3GPP Security. 16.4 Mobile Platform Layer Security. 16.5 Hardware Attacks on Mobile Equipment. 16.6 Conclusion. 17. IEEE 802.11 Security (Daniel L. Lough, David J. Robinson, and Ian G. Schneller). 17.1 Introduction. 17.2 Introduction to IEEE 802.11. 17.3 Wired Equivalent Privacy. 17.4 Additional IEEE 802.11 Security Techniques. 17.5 Wireless Intrusion Detection Systems. 17.6 Practical IEEE 802.11 Security Measures. 17.7 Conclusions. 18. Bluetooth Security (Christian Gehrmann). 18.1 Introduction. 18.2 Bluetooth Wireless Technology. 18.3 Security Architecture. 18.4 Security Weaknesses and Countermeasures. 18.5 Bluetooth Security: What Comes Next?

19. Mobile Telecom Networks (Christos Xenakis and Lazaros Merakos). 19.1 Introduction. 19.2 Architectures Network. 19.3 Security Architectures. 19.4 Research Issues. 19.5 Conclusions. 20. Security in Mobile Ad HocNetworks (Mike Burmester, Panayiotis Kotznanikolaou, and Christos Douligeris). 20.1 Introduction. 20.2 Routing Protocols. 20.3 Security Vulnerabilities. 20.4 Preventing Attacks in MANETs. 20.5 Trust in MANETs. 20.6 Establishing Secure Routes in a MANET. 20.7 Cryptographic Tools for MANETs. 21. Wireless Sensor Networks (Artemios G. Voyiatzis and Dimitrios N. Serpanos). 21.1 Introduction. 21.2 Sensor Devices. 21.3 Sensor Network Security. 21.4 Future Directions. 21.5 Conclusions. 22. Trust (Lidong Chen). 22.1 Introduction. 22.2 What Is a trust Model? 22.3 How Trust Models Work? 22.4 Where Trust Can Go Wrong? 22.5 Why Is It Diffi cult to Defi ne Trust? 22.6 Which Lessons Have We Learned?

Part Four Trust, Anonymity, and Privacy. 23. PKI Systems (Nikos Komninos). 23.1 Introduction. 23.2 Origins of Cryptography. 23.3 Overview of PKI Systems. 23.4 Components of PKI Systems. 23.5 Procedures of PKI Systems. 23.6 Current and Future Aspects of PKI Systems. 23.7 Conclusions. 24. Privacy in Electronic Communications (Alf Zugenmaier and Joris Claessens). 24.1 Introduction. 24.2 Protection from Third Party: Confidentiality. 24.3 Protection from Communication Partner. 24.4 Invasions of Electronic Private Sphere. 24.5 Balancing Privacy with Other Needs. 24.6 Structure of Privacy. 24.7 Conclusion and Future Trends. 25. Securing Digital Content (Magda M. Mourad and Ahmed N. Tantawy). 25.1 Introduction. 25.2 Securing Digital Content: Need and Challenges. 25.3 Content Protection Techniques. 25.4 Illustrative Application: EPublishing of E-Learning Content. 25.5 Concluding Remarks. Appendix A. Cryptography Primer: Introduction to Cryptographic Principles and Algorithms (Panayiotis Kotzanikolaou and Christos Douligeris). A.1 Introduction. A.2 Cryptographic Primitives. A.3 Symmetric-Key Cryptography. A.4 Asymmetric-Key Cryptography.

A.5 Key Management. A.6. Conclusions and Other Fields of Cryptography. Appendix B. Network Security: Overview of Current Legal and Policy Issues (Andreas Mitrakas). B.1 Introduction. B.2 Network Security as a Legal Requirement. B.3 Network Security Policy Overview. B.4 Legal Aspects of Network Security. B.5 Self-Regulatory Security Frameworks. B.6 Conclusions. Appendix C. Standards in Network Security (Despina Polemi and Panagiotis Sklavos). C.1 Introduction. C.2 Virtual Private Networks: Internet Protocol Security (IPSec). C.3 Multicast Security (MSEC). C.4 Transport Layer Security (TLS). C.5 Routing Security. C.6 ATM Networks Security. C.7 Third-Generation (3G) Mobile Networks. C.8 Wireless LAN (802.11) Security. C.9 E-Mail Security. C.10 Public-Key Infrastructure (X.509). Index. About the Editors and Authors. Ordering: Order Online - http://www.researchandmarkets.com/reports/2175769/ Order by Fax - using the form below Order by Post - print the order form below and send to Research and Markets, Guinness Centre, Taylors Lane, Dublin 8, Ireland.

Page 1 of 2 Fax Order Form To place an order via fax simply print this form, fill in the information below and fax the completed form to 646-607-1907 (from USA) or +353-1-481-1716 (from Rest of World). If you have any questions please visit http://www.researchandmarkets.com/contact/ Order Information Please verify that the product information is correct. Product Name: Web Address: Office Code: Network Security. Current Status and Future Directions http://www.researchandmarkets.com/reports/2175769/ SC Product Format Please select the product format and quantity you require: Hard Copy (Hard Back): Quantity USD 130 + USD 28 Shipping/Handling * Shipping/Handling is only charged once per order. Contact Information Please enter all the information below in BLOCK CAPITALS Title: Mr Mrs Dr Miss Ms Prof First Name: Last Name: Email Address: * Job Title: Organisation: Address: City: Postal / Zip Code: Country: Phone Number: Fax Number: * Please refrain from using free email accounts when ordering (e.g. Yahoo, Hotmail, AOL)

Page 2 of 2 Payment Information Please indicate the payment method you would like to use by selecting the appropriate box. Pay by credit card: You will receive an email with a link to a secure webpage to enter your credit card details. Pay by check: Please post the check, accompanied by this form, to: Research and Markets, Guinness Center, Taylors Lane, Dublin 8, Ireland. Pay by wire transfer: Please transfer funds to: Account number 833 130 83 Sort code 98-53-30 Swift code IBAN number Bank Address ULSBIE2D IE78ULSB98533083313083 Ulster Bank, 27-35 Main Street, Blackrock, Co. Dublin, Ireland. If you have a Marketing Code please enter it below: Marketing Code: Please note that by ordering from Research and Markets you are agreeing to our Terms and Conditions at http://www.researchandmarkets.com/info/terms.asp Please fax this form to: (646) 607-1907 or (646) 964-6609 - From USA +353-1-481-1716 or +353-1-653-1571 - From Rest of World