krainaksiazek secure wireless sensor networks threats and solutions 20168659

- znaleziono 6 produktów w 2 sklepach

Hierarchical LIMOS Model For Heterogeneous Wireless Sensor Network - 2835644453

236,23 zł

Hierarchical LIMOS Model For Heterogeneous Wireless Sensor Network LAP Lambert Academic Publishing

Książki / Literatura obcojęzyczna

Wireless Sensors are one of the cutting edge technologies used for real time applications.In this field, accuracy and response time play significant role.Wireless sensor network is vulnerable to a wide range of attacks due to its deployment in the hostile environment.So need of the day is to use effective mechanism to protect sensor networks against different types of threats. A particularly devastating attack for limited battery sensor nodes is sleep deprivation attack where nodes are forced to wake-up and waste their battery power.Consequently unavoidable circumstances may appear in the application field of sensor network.For this reason, a system model is proposed here to extend the lifetime of wireless sensor network, even in the face of sleep deprivation torture. Hierarchical Lightweight Insomnia Monitoring System Model uses load distribution mechanism to secure sensor network in energy efficient manner.

Sklep: Libristo.pl

Securing Cisco IP Telephony Networks - 2826930136

294,96 zł

Securing Cisco IP Telephony Networks CISCO

Książki / Literatura obcojęzyczna

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there's a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures-and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable. Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You'll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter. This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants. * Recognize vulnerabilities caused by IP network integration, as well as VoIP's unique security requirements* Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks* Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security* Use a layered (defense-in-depth) approach that builds on underlying network security design* Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats* Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security* Complete coverage of Cisco IP Telephony encryption and authentication fundamentals* Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks* Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors* Secure Cisco IP telephony endpoints-Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats This IP communications book is part of the Cisco Press(R) Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

Sklep: Libristo.pl

Practical UNIX and Internet Security - 2826759719

268,58 zł

Practical UNIX and Internet Security O´REILLY

Książki / Literatura obcojęzyczna

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: * Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. * Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. * Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. * Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. * Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. * Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.

Sklep: Libristo.pl

Network-Aware Security for Group Communications - 2826705966

707,37 zł

Network-Aware Security for Group Communications Springer, Berlin

Książki / Literatura obcojęzyczna

This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes the state-of-the-art in securing group communications in emerging networks and for future applications. The growth of multi-user services makes it essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications. This book is focused on tailoring security solutions to the underlying network architecture (such as the wireless cellular network, or ad hoc and sensor networks), or to targeted applications using methods tailored for that application (such as multimedia multicasts). The authors focus the discussion on two fundamental security issues for group communications: providing efficient key management for providing confidentiality, and providing authentication for group services.

Sklep: Libristo.pl

Managing Cisco Network Security - 2212827506

202,10 zł

Managing Cisco Network Security Syngress

Informatyka

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions. Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) studentsExpanded to include separate chapters on each of the security products offered by Cisco Systems

Sklep: Albertus.pl

Network Security For Dummies - 2826828097

193,43 zł

Network Security For Dummies Wiley

Książki / Literatura obcojęzyczna

CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your favorite Web sites and stolen thousands of credit card numbers. The FBI just released a new report on computer crime that's got you shaking in your boots. The experts will tell you that keeping your network safe from the cyber-wolves howling after your assets is complicated, expensive, and best left to them. But the truth is, anybody with a working knowledge of networks and computers can do just about everything necessary to defend their network against most security threats. Network Security For Dummies arms you with quick, easy, low-cost solutions to all your network security concerns. Whether your network consists of one computer with a high-speed Internet connection or hundreds of workstations distributed across dozens of locations, you'll find what you need to confidently:* Identify your network's security weaknesses* Install an intrusion detection system* Use simple, economical techniques to secure your data* Defend against viruses* Keep hackers at bay* Plug security holes in individual applications* Build a secure network from scratch Leading national expert Chey Cobb fills you in on the basics of data security, and he explains more complex options you can use to keep your network safe as your grow your business. Among other things, you'll explore:* Developing risk assessments and security plans* Choosing controls without breaking the bank* Anti-virus software, firewalls, intrusion detection systems and access controls* Addressing Unix, Windows and Mac security issues* Patching holes in email, databases, Windows Media Player, NetMeeting, AOL Instant Messenger, and other individual applications* Securing a wireless network* E-Commerce security* Incident response and disaster recovery Whether you run a storefront tax preparing business or you're the network administrator at a multinational accounting giant, your computer assets are your business. Let Network Security For Dummies provide you with proven strategies and techniques for keeping your precious assets safe.

Sklep: Libristo.pl

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z krainaksiazek pl secure wireless sensor networks threats and solutions 20168659

2. Szukaj na wszystkich stronach serwisu

t1=0.03, t2=0, t3=0, t4=0, t=0.031

Dla sprzedawców

copyright © 2005-2016 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER