| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000046009515 | |
| 005 | 20191217161633 | |
| 008 | 191216s2019 flua b 001 0 eng d | |
| 010 | ▼a 2018037448 | |
| 020 | ▼a 9780815381143 (hardback : acid-free paper) | |
| 035 | ▼a (KERIS)REF000018769261 | |
| 040 | ▼a DLC ▼b eng ▼e rda ▼c DLC ▼d 211009 | |
| 050 | 0 0 | ▼a TK5105.5833 ▼b .H83 2018 |
| 082 | 0 0 | ▼a 005.8 ▼2 23 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b H8742s | |
| 100 | 1 | ▼a Huang, Dijiang. |
| 245 | 1 0 | ▼a Software-defined networking and security : ▼b from theory to practice / ▼c Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody. |
| 260 | ▼a Boca Raton, FL : ▼b CRC Press/Taylor & Francis Group, ▼c c2019. | |
| 300 | ▼a xxvii, 328 p. : ▼b ill. ; ▼c 25 cm. | |
| 490 | 1 | ▼a Data-enabled engineering |
| 504 | ▼a Includes bibliographical references and index. | |
| 520 | ▼a "This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. It covers modern computing paradigms such as Software-Defined Networks and Network Functions Virtualization (SDN-NFV), and their effectiveness in implementing Moving Target Defense responses. Source codes, online labs, and exercises are available at the author's university website"-- ▼c Provided by publisher. | |
| 650 | 0 | ▼a Software-defined networking (Computer network technology). |
| 700 | 1 | ▼a Chowdhary, Ankur. |
| 700 | 1 | ▼a Pisharody, Sandeep. |
| 830 | 0 | ▼a Data-enabled engineering. |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 H8742s | 등록번호 121251572 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network.
The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference.
Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/.
Features
- Discusses virtual network security concepts
- Considers proactive security using moving target defense
- Reviews attack representation models based on attack graphs and attack trees
- Examines service function chaining in virtual networks with security considerations
- Recognizes machine learning and AI in network security
This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense.
정보제공 :
목차
Part I: Computer Network Foundation. Introduction. Network Interconnection. Virtual Network. SDN and NFV. Part II: Network Security Foundation. Network Security Preliminary. Firewalls. Network Intrusion Detection. Penetration and Testing. Authentication and Access Control. Part III: Advanced Topics in Network Security. Moving Target Defense (MTD). Attack Representation. Attack Mitigation Techniques. Countermeasure Analysis. Advanced Topics. Lab Book: ThoTh Lab (hosted online at ASU). Introduction of ThoTh Lab. Network Security. Software Defined Networking. Network Function Virtualization. Appendix: Source Codes of SDN and MTD Schemes.
