Indices3
Network Security, Administration and Management: Advancing Technology and Practice

Network Security, Administration and Management: Advancing Technology and Practice

Copyright: © 2011 |Pages: 384
ISBN13: 9781609607777|ISBN10: 1609607775|EISBN13: 9781609607784
DOI: 10.4018/978-1-60960-777-7
Cite Book Cite Book

MLA

Kar, Dulal Chandra, and Mahbubur Rahman Syed, editors. Network Security, Administration and Management: Advancing Technology and Practice. IGI Global, 2011. https://doi.org/10.4018/978-1-60960-777-7

APA

Kar, D. C. & Syed, M. R. (Eds.). (2011). Network Security, Administration and Management: Advancing Technology and Practice. IGI Global. https://doi.org/10.4018/978-1-60960-777-7

Chicago

Kar, Dulal Chandra, and Mahbubur Rahman Syed, eds. Network Security, Administration and Management: Advancing Technology and Practice. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-777-7

Export Reference

Mendeley
Favorite Full-Book Download

The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes.

Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Network Systems Security
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Authentication and Data Privacy
This content has been removed at the discretion of the publisher and the editors.
Network Security Auditing, Assessment, and Manageability Security
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Sensor Network Security  (pages 182-182)
Sensor Network Security
This content has been removed at the discretion of the publisher and the editors.
Security Architectures, Algorithms, and Protocols
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.