Reference Hub4
Indices1
Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Copyright: © 2014 |Pages: 330
ISBN13: 9781466647893|ISBN10: 1466647892|EISBN13: 9781466647909
DOI: 10.4018/978-1-4666-4789-3
Cite Book Cite Book

MLA

Amine, Abdelmalek, et al., editors. Network Security Technologies: Design and Applications. IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4789-3

APA

Amine, A., Mohamed, O. A., & Benatallah, B. (Eds.). (2014). Network Security Technologies: Design and Applications. IGI Global. https://doi.org/10.4018/978-1-4666-4789-3

Chicago

Amine, Abdelmalek, Otmane Ait Mohamed, and Boualem Benatallah, eds. Network Security Technologies: Design and Applications. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4789-3

Export Reference

Mendeley
Favorite Full-Book Download

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels.

Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board and List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Related References
This content has been removed at the discretion of the publisher and the editors.
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.