Information Systems Security

5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

Lecture Notes in Computer Science Band 5905

eBook
eBook
Fr. 106.90
Fr. 106.90
inkl. gesetzl. MwSt.
inkl. gesetzl. MwSt.
Sofort per Download lieferbar
Sofort per Download lieferbar
Sie können dieses eBook verschenken  i

Weitere Formate

Taschenbuch

ab Fr. 83.90

Accordion öffnen
  • Information Systems Security

    Springer Berlin

    Versandfertig innert 1 - 2 Werktagen

    Fr. 83.90

    Springer Berlin
  • Information Systems Security

    Springer

    Versandfertig innert 6 - 9 Werktagen

    Fr. 102.00

    Springer

eBook

ab Fr. 90.90

Accordion öffnen
  • Information Systems Security

    PDF (Springer)

    Sofort per Download lieferbar

    Fr. 90.90

    PDF (Springer)
  • Information Systems Security

    PDF (Springer)

    Sofort per Download lieferbar

    Fr. 106.90

    PDF (Springer)

Beschreibung

The management of services and operations in today's organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN). An enterprise LAN consists of a set of network zones (logical group of networkelements)correspondingto di?erent departments orsections,connected through various interface switches (typically, Layer-3 switches). The network service accesses between these zones and also with the external network (e. g. , Internet) are governed by a global network security policy of the organization. This global policy is de?ned as a collection of service access rules across various network zones where the services referred network applications conforming to TCP/IP protocol. For example, some of the known network services aressh, t- net,http etc. In reality, the security policy may be incompletely speci?ed; which explicitly states the "permit" and "deny" access rules between speci?c network zones keeping remaining service access paths as unspeci?ed. The global security policy is realized in the network by con?guring the n- work interfaces with appropriate sets of access control rules (ACLs). One of the major challenges in network security management is ensuring the conformation of the distributed security implementations with the global security policy.

Produktdetails

Format PDF i
Kopierschutz Nein i
Family Sharing Nein i
Text-to-Speech Ja i
Erscheinungsdatum 16.11.2009
Herausgeber Atul Prakash
Verlag Springer
Seitenzahl 327 (Printausgabe)
Dateigröße 5774 KB
Sprache Englisch
EAN 9783642107726

Weitere Bände von Lecture Notes in Computer Science

Kundenbewertungen

Es wurden noch keine Bewertungen geschrieben.

  • artikelbild-0