Synchronizing Internet Protocol Security (SIPSec) Synchronizing Internet Protocol Security (SIPSec)
Advances in Information Security

Synchronizing Internet Protocol Security (SIPSec‪)‬

    • $119.99
    • $119.99

Publisher Description

The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attackers against organizations network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so much data transferring over the public networks, the risk for sensitive information has increased exponentially, while the increase of internet hosts continually requires additional function support.

Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This book also identifies the security problems facing the internet communication protocols, the risks associated with internet connections, delimitations of the IPSec, and finally, a "Synchronisation of Internet Protocol Security (SIPSec)" model.

Synchronizing Internet Protocol Security is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science.

GENRE
Computers & Internet
RELEASED
2007
June 10
LANGUAGE
EN
English
LENGTH
241
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
5.4
MB
Securing Biometrics Applications Securing Biometrics Applications
2008
Electronic Healthcare Information Security Electronic Healthcare Information Security
2010
Impacts and Risk Assessment of Technology for Internet Security Impacts and Risk Assessment of Technology for Internet Security
2006
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007