Selecting the Best Tool for the Test
To Be Published January 31st 2015 by CRC Press
Algorithms and Implementations using C++
Supplying a comprehensive survey of modern cryptography, this book details how programmers and electronic communications professionals can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into...
To Be Published November 30th 2014 by Auerbach Publications
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...
Published January 28th 2014 by Auerbach Publications
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods ...
Published May 20th 2013 by Auerbach Publications
Theory and Practice
Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields...
Published January 28th 2013 by CRC Press
Current Status and Future Trends
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of...
Published November 15th 2012 by CRC Press
MANET, WSN, WMN, VANET
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical...
Published October 13th 2010 by Auerbach Publications