Host Identity Protocol (HIP): towards the secure mobile Internet
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chichester, U.K.
Wiley
2008
|
Schriftenreihe: | Wiley series in communications networking & distributed systems
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | Includes bibliographical references (pages 285-290) and index "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it."--Jari Arkko, Internet Area Director, IETF . One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being de |
Beschreibung: | 1 Online-Ressource (x, 295 pages) |
ISBN: | 9780470772904 0470772905 9780470772898 0470772891 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043389292 | ||
003 | DE-604 | ||
005 | 20200511 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2008 |||| o||u| ||||||eng d | ||
020 | |a 9780470772904 |c electronic bk. |9 978-0-470-77290-4 | ||
020 | |a 0470772905 |c electronic bk. |9 0-470-77290-5 | ||
020 | |a 9780470772898 |9 978-0-470-77289-8 | ||
020 | |a 0470772891 |9 0-470-77289-1 | ||
024 | 7 | |a 10.1002/9780470772898 |2 doi | |
035 | |a (ZDB-35-WIC)ocn297220205 | ||
035 | |a (OCoLC)297220205 | ||
035 | |a (DE-599)BVBBV043389292 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Gurtov, Andrei |e Verfasser |4 aut | |
245 | 1 | 0 | |a Host Identity Protocol (HIP) |b towards the secure mobile Internet |c Andrei Gurtov |
264 | 1 | |a Chichester, U.K. |b Wiley |c 2008 | |
300 | |a 1 Online-Ressource (x, 295 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley series in communications networking & distributed systems | |
500 | |a Includes bibliographical references (pages 285-290) and index | ||
500 | |a "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it."--Jari Arkko, Internet Area Director, IETF . One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being de | ||
650 | 4 | |a Wireless Internet | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Wireless Internet / Security measures | |
650 | 4 | |a Host Identity Protocol (Computer network protocol) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-470-99790-1 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-WEL | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028807876 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175962233896960 |
---|---|
any_adam_object | |
author | Gurtov, Andrei |
author_facet | Gurtov, Andrei |
author_role | aut |
author_sort | Gurtov, Andrei |
author_variant | a g ag |
building | Verbundindex |
bvnumber | BV043389292 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)ocn297220205 (OCoLC)297220205 (DE-599)BVBBV043389292 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02667nmm a2200505zc 4500</leader><controlfield tag="001">BV043389292</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200511 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470772904</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-77290-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470772905</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-77290-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470772898</subfield><subfield code="9">978-0-470-77289-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470772891</subfield><subfield code="9">0-470-77289-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9780470772898</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn297220205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)297220205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043389292</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gurtov, Andrei</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Host Identity Protocol (HIP)</subfield><subfield code="b">towards the secure mobile Internet</subfield><subfield code="c">Andrei Gurtov</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, U.K.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 295 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley series in communications networking & distributed systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 285-290) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it."--Jari Arkko, Internet Area Director, IETF . One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being de</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Host Identity Protocol (Computer network protocol)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-470-99790-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028807876</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043389292 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:37Z |
institution | BVB |
isbn | 9780470772904 0470772905 9780470772898 0470772891 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028807876 |
oclc_num | 297220205 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (x, 295 pages) |
psigel | ZDB-35-WIC ZDB-35-WEL UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Wiley |
record_format | marc |
series2 | Wiley series in communications networking & distributed systems |
spelling | Gurtov, Andrei Verfasser aut Host Identity Protocol (HIP) towards the secure mobile Internet Andrei Gurtov Chichester, U.K. Wiley 2008 1 Online-Ressource (x, 295 pages) txt rdacontent c rdamedia cr rdacarrier Wiley series in communications networking & distributed systems Includes bibliographical references (pages 285-290) and index "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it."--Jari Arkko, Internet Area Director, IETF . One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being de Wireless Internet COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless Internet / Security measures Host Identity Protocol (Computer network protocol) Erscheint auch als Druck-Ausgabe, Hardcover 978-0-470-99790-1 https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Gurtov, Andrei Host Identity Protocol (HIP) towards the secure mobile Internet Wireless Internet COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless Internet / Security measures Host Identity Protocol (Computer network protocol) |
title | Host Identity Protocol (HIP) towards the secure mobile Internet |
title_auth | Host Identity Protocol (HIP) towards the secure mobile Internet |
title_exact_search | Host Identity Protocol (HIP) towards the secure mobile Internet |
title_full | Host Identity Protocol (HIP) towards the secure mobile Internet Andrei Gurtov |
title_fullStr | Host Identity Protocol (HIP) towards the secure mobile Internet Andrei Gurtov |
title_full_unstemmed | Host Identity Protocol (HIP) towards the secure mobile Internet Andrei Gurtov |
title_short | Host Identity Protocol (HIP) |
title_sort | host identity protocol hip towards the secure mobile internet |
title_sub | towards the secure mobile Internet |
topic | Wireless Internet COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless Internet / Security measures Host Identity Protocol (Computer network protocol) |
topic_facet | Wireless Internet COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Wireless Internet / Security measures Host Identity Protocol (Computer network protocol) |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9780470772898 |
work_keys_str_mv | AT gurtovandrei hostidentityprotocolhiptowardsthesecuremobileinternet |