Limit this search to....

Software-Defined Networking and Security: From Theory to Practice
Contributor(s): Huang, Dijiang (Author), Chowdhary, Ankur (Author), Pisharody, Sandeep (Author)
ISBN: 081538114X     ISBN-13: 9780815381143
Publisher: CRC Press
OUR PRICE:   $142.50  
Product Type: Hardcover - Other Formats
Published: December 2018
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Additional Information
BISAC Categories:
- Computers | Networking - General
- Technology & Engineering | Industrial Health & Safety
- Technology & Engineering | Manufacturing
Dewey: 005.8
LCCN: 2018037448
Series: Data-Enabled Engineering
Physical Information: 356 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network.

The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference.

Hand-on labs and lecture slides are located at http: //virtualnetworksecurity.thothlab.com/.

Features

  • Discusses virtual network security concepts
  • Considers proactive security using moving target defense
  • Reviews attack representation models based on attack graphs and attack trees
  • Examines service function chaining in virtual networks with security considerations
  • Recognizes machine learning and AI in network security