Automated Firewall Analytics (Record no. 57021)

000 -LEADER
fixed length control field 03213nam a22005055i 4500
001 - CONTROL NUMBER
control field 978-3-319-10371-6
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112048.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140923s2014 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319103716
-- 978-3-319-10371-6
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Al-Shaer, Ehab.
245 10 - TITLE STATEMENT
Title Automated Firewall Analytics
Sub Title Design, Configuration and Optimization /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 132 p. 32 illus., 12 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Classification and Discovery of Firewalls Policy Anomalies -- Modeling and Verification of Firewall and IPSec Policies using Binary Decision Diagrams -- Specification and Refinement of a Conflict-Free Distributed Firewall Configuration Language -- Design and Configuration of Firewall Architecture Under Risk, Usability and Cost Constraints -- Dynamic Firewall Configuration Optimization. .
520 ## - SUMMARY, ETC.
Summary, etc This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-10371-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2014.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems and Communication Service.
912 ## -
-- ZDB-2-SCS

No items available.