Selecting the Best Tool for the Test
Simulation is a widely used mechanism for validating the theoretical model of networking or communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. This book addresses...
To Be Published December 17th 2014 by CRC Press
Algorithms and Implementations Using C++
Supplying a comprehensive survey of modern cryptography, this book details how programmers and electronic communications professionals can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into...
To Be Published December 1st 2014 by Auerbach Publications
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...
Published January 29th 2014 by Auerbach Publications
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods ...
Published May 21st 2013 by Auerbach Publications
Theory and Practice
Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields...
Published January 29th 2013 by CRC Press
Current Status and Future Trends
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of...
Published November 16th 2012 by CRC Press
MANET, WSN, WMN, VANET
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical...
Published October 14th 2010 by Auerbach Publications