Software-defined networking and security: from theory to practice
"This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
CRC Press/Taylor & Francis Group
[2019]
|
Ausgabe: | First edition |
Schriftenreihe: | Data-enabled engineering series
|
Schlagworte: | |
Zusammenfassung: | "This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. It covers modern computing paradigms such as Software-Defined Networks and Network Functions Virtualization (SDN-NFV), and their effectiveness in implementing Moving Target Defense responses. Source codes, online labs, and exercises are available at the author's university website"... |
Beschreibung: | xxvii, 328 Seiten |
ISBN: | 9780815381143 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045532763 | ||
003 | DE-604 | ||
005 | 20190502 | ||
007 | t | ||
008 | 190328s2019 xxu |||| 00||| eng d | ||
010 | |a 018037448 | ||
020 | |a 9780815381143 |9 978-0-8153-8114-3 | ||
035 | |a (OCoLC)1099850845 | ||
035 | |a (DE-599)BVBBV045532763 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-83 | ||
050 | 0 | |a TK5105.5833 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Huang, Dijiang |e Verfasser |0 (DE-588)1143133714 |4 aut | |
245 | 1 | 0 | |a Software-defined networking and security |b from theory to practice |c Dijiang Huang, Ankur Chowdhary and Sandeep Pisharody |
250 | |a First edition | ||
264 | 1 | |a Boca Raton, FL |b CRC Press/Taylor & Francis Group |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xxvii, 328 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Data-enabled engineering series | |
520 | |a "This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. It covers modern computing paradigms such as Software-Defined Networks and Network Functions Virtualization (SDN-NFV), and their effectiveness in implementing Moving Target Defense responses. Source codes, online labs, and exercises are available at the author's university website"... | ||
650 | 4 | |a Software-defined networking (Computer network technology) | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chowdhary, Ankur |e Verfasser |4 aut | |
700 | 1 | |a Pisharody, Sandeep |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030916839 |
Datensatz im Suchindex
_version_ | 1804179492674994176 |
---|---|
any_adam_object | |
author | Huang, Dijiang Chowdhary, Ankur Pisharody, Sandeep |
author_GND | (DE-588)1143133714 |
author_facet | Huang, Dijiang Chowdhary, Ankur Pisharody, Sandeep |
author_role | aut aut aut |
author_sort | Huang, Dijiang |
author_variant | d h dh a c ac s p sp |
building | Verbundindex |
bvnumber | BV045532763 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5833 |
callnumber-search | TK5105.5833 |
callnumber-sort | TK 45105.5833 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1099850845 (DE-599)BVBBV045532763 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02224nam a2200457 c 4500</leader><controlfield tag="001">BV045532763</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190502 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190328s2019 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">018037448</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780815381143</subfield><subfield code="9">978-0-8153-8114-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1099850845</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045532763</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5833</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Huang, Dijiang</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1143133714</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software-defined networking and security</subfield><subfield code="b">from theory to practice</subfield><subfield code="c">Dijiang Huang, Ankur Chowdhary and Sandeep Pisharody</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press/Taylor & Francis Group</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvii, 328 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Data-enabled engineering series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. It covers modern computing paradigms such as Software-Defined Networks and Network Functions Virtualization (SDN-NFV), and their effectiveness in implementing Moving Target Defense responses. Source codes, online labs, and exercises are available at the author's university website"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software-defined networking (Computer network technology)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chowdhary, Ankur</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pisharody, Sandeep</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030916839</subfield></datafield></record></collection> |
id | DE-604.BV045532763 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:20:44Z |
institution | BVB |
isbn | 9780815381143 |
language | English |
lccn | 018037448 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030916839 |
oclc_num | 1099850845 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | xxvii, 328 Seiten |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | CRC Press/Taylor & Francis Group |
record_format | marc |
series2 | Data-enabled engineering series |
spelling | Huang, Dijiang Verfasser (DE-588)1143133714 aut Software-defined networking and security from theory to practice Dijiang Huang, Ankur Chowdhary and Sandeep Pisharody First edition Boca Raton, FL CRC Press/Taylor & Francis Group [2019] © 2019 xxvii, 328 Seiten txt rdacontent n rdamedia nc rdacarrier Data-enabled engineering series "This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user experience. This book discusses how to detect multi-stage attack. It presents a comparative study of methods and solutions. It covers modern computing paradigms such as Software-Defined Networks and Network Functions Virtualization (SDN-NFV), and their effectiveness in implementing Moving Target Defense responses. Source codes, online labs, and exercises are available at the author's university website"... Software-defined networking (Computer network technology) Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s DE-604 Chowdhary, Ankur Verfasser aut Pisharody, Sandeep Verfasser aut |
spellingShingle | Huang, Dijiang Chowdhary, Ankur Pisharody, Sandeep Software-defined networking and security from theory to practice Software-defined networking (Computer network technology) Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 |
title | Software-defined networking and security from theory to practice |
title_auth | Software-defined networking and security from theory to practice |
title_exact_search | Software-defined networking and security from theory to practice |
title_full | Software-defined networking and security from theory to practice Dijiang Huang, Ankur Chowdhary and Sandeep Pisharody |
title_fullStr | Software-defined networking and security from theory to practice Dijiang Huang, Ankur Chowdhary and Sandeep Pisharody |
title_full_unstemmed | Software-defined networking and security from theory to practice Dijiang Huang, Ankur Chowdhary and Sandeep Pisharody |
title_short | Software-defined networking and security |
title_sort | software defined networking and security from theory to practice |
title_sub | from theory to practice |
topic | Software-defined networking (Computer network technology) Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Software-defined networking (Computer network technology) Rechnernetz Computersicherheit |
work_keys_str_mv | AT huangdijiang softwaredefinednetworkingandsecurityfromtheorytopractice AT chowdharyankur softwaredefinednetworkingandsecurityfromtheorytopractice AT pisharodysandeep softwaredefinednetworkingandsecurityfromtheorytopractice |