16 125 881 książek w 175 językach
Jednak się nie przyda? Nic nie szkodzi! U nas możesz zwrócić towar do 30 dni
Bon prezentowy to zawsze dobry pomysł. Obdarowany może za bon prezentowy wybrać cokolwiek z naszej oferty.
30 dni na zwrot towaru
Over the past decade, the number of networked devices has increased drastically. This increase has also been characterized by the advancement in network intrusion mechanisms. The traditional methods of network and data protection revolved around authentication protocols, cryptography, firewalls, proxy servers and physical protection. However, each of these technques has been compromized, leading to theft or manipulation of data. This book explores some of these mechanisms and shows how each of them falls short of the expectations for a secure network. A new architecture based on routing protocol transformation is suggested and implemented as a more secure approach to network security. This book is specifically dedicated to masters students in the fields of telecommunications and information egineering, electrical and electronics engineering, computer systems, software engineering and communication systems. The final students in the mentioned fields may also find this book instrumental in their project work.