Automated Firewall Analytics (Record no. 57021)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03213nam a22005055i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-10371-6 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421112048.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140923s2014 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319103716 |
-- | 978-3-319-10371-6 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Al-Shaer, Ehab. |
245 10 - TITLE STATEMENT | |
Title | Automated Firewall Analytics |
Sub Title | Design, Configuration and Optimization / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIII, 132 p. 32 illus., 12 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Classification and Discovery of Firewalls Policy Anomalies -- Modeling and Verification of Firewall and IPSec Policies using Binary Decision Diagrams -- Specification and Refinement of a Conflict-Free Distributed Firewall Configuration Language -- Design and Configuration of Firewall Architecture Under Risk, Usability and Cost Constraints -- Dynamic Firewall Configuration Optimization. . |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-10371-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2014. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information Systems and Communication Service. |
912 ## - | |
-- | ZDB-2-SCS |
No items available.