Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Network Security Auditing

Network Security Auditing

Best Research Book in Network Security Auditing

Author(s) Name:  Yin Pan, Bo Yuan, Sumita Mishra

About the Book:

   As people increasingly rely on computer systems and networks for services such as online banking, online shopping, and socialization, information security for identity protection and privacy has become more important today than ever. Businesses and organizations are also obligated to provide such security to comply with state and federal laws and regulations. Managing security risks and ensuring compliance with information security regulations and industry standards have become important for businesses and organizations.
   Security auditing is an effective process to assess policies, procedures, and controls in identifying risks associated with networks and various operating systems. This chapter emphasizes network security audits and discusses various auditing procedures and technologies to identify and examine threats and vulnerabilities in computer networks, and to determine how to assess and manage risk posed to a network.

Table of Contents

  • Basic Device and Protocol Security
  • Mitigating the Blended Threat: Protecting Data and Educating Users
  • Security Issues for Multi-Domain Resource Reservation
  • Healthcare Employees and Passwords: An Entry Point for Social Engineering Attacks
  • Public Key Infrastructure
  • Key Management
  • Security Assessment of Networks
  • Network Security Auditing
  • Network Manageability Security
  • Security and Attacks in Wireless Sensor Networks
  • Wireless Sensor Networks: Emerging Applications and Security Solutions
  • Privacy Preserving Data Gathering in Wireless Sensor Network
  • BANBAD: A Centralized Anomaly Detection Technique for Ad Hoc Networks
  • Data Regulation Protocol for Source-End Mitigation of Distributed Denial of Service
  • Instant Messaging Security
  • ISBN:  9781609607777

    Publisher:  IGI Global

    Year of Publication:  2011

    Book Link:  Home Page Url