Network Security, Administration and Management: Advancing Technology and Practice, 1st Edition

  • Dulal Chandra Kar
  • Published By:
  • ISBN-10: 1609607783
  • ISBN-13: 9781609607784
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 384 Pages | eBook
  • Original Copyright 2011 | Published/Released November 2012
  • This publication's content originally published in print form: 2011

  • Price:  Sign in for price



The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. NETWORK SECURITY, ADMINISTRATION AND MANAGEMENT: ADVANCING TECHNOLOGY AND PRACTICEidentifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Advisory Board.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
1: Network Systems Security.
2: Basic Device and Protocol Security.
3: Mitigating the Blended Threat: Protecting Data and Educating Users.
4: Security Issues for Multi-Domain Resource Reservation.
5: Authentication and Data Privacy: Passwords and Keys.
6: Healthcare Employees and Passwords: An Entry Point for Social Engineering Attacks.
7: Public Key Infrastructure.
8: Key Management.
9: Network Security Auditing, Assessment, and Manageability Security.
10: Security Assessment of Networks.
11: Network Security Auditing.
12: Network Manageability Security.
13: Sensor Network Security.
14: Security and Attacks in Wireless Sensor Networks.
15: Wireless Sensor Networks: Emerging Applications and Security Solutions.
16: Privacy Preserving Data Gathering in Wireless Sensor Networks.
17: Security Architectures, Algorithms, and Protocols.
18: BANBAD: A Centralized Anomaly Detection Technique for Ad Hoc Networks.
19: Data Regulation Protocol for Source-End Mitigation of Distributed Denial of Service.
20: Instant Messaging Security.
Compilation of References.
About the Contributors.