Haben Sie Fragen? Einfach anrufen, wir helfen gerne: Tel. 089/210233-0
oder besuchen Sie unser Ladengeschäft in der Pacellistraße 5 (Maxburg) 80333 München
+++ Versandkostenfreie Lieferung innerhalb Deutschlands
Haben Sie Fragen? Tel. 089/210233-0

Information Systems Security

53,49 €*

Sofort verfügbar, Lieferzeit: 1-3 Tage

Produktnummer: 18cccdc157e79e4491b267257b3d2172ee
Themengebiete: Radio-Frequency Identification (RFID) access control authentication authorization biometric biometrics complexity copyright protection cryptography intrusion detection
Veröffentlichungsdatum: 24.11.2009
EAN: 9783642107719
Sprache: Englisch
Seitenzahl: 327
Produktart: Kartoniert / Broschiert
Herausgeber: Prakash, Atul
Verlag: Springer Berlin
Untertitel: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Produktinformationen "Information Systems Security"
The management of services and operations in today’s organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN). An enterprise LAN consists of a set of network zones (logical group of networkelements)correspondingto di?erent departments orsections,connected through various interface switches (typically, Layer-3 switches). The network service accesses between these zones and also with the external network (e. g. , Internet) are governed by a global network security policy of the organization. This global policy is de?ned as a collection of service access rules across various network zones where the services referred network applications conforming to TCP/IP protocol. For example, some of the known network services aressh, t- net,http etc. In reality, the security policy may be incompletely speci?ed; which explicitly states the “permit” and “deny” access rules between speci?c network zones keeping remaining service access paths as unspeci?ed. The global security policy is realized in the network by con?guring the n- work interfaces with appropriate sets of access control rules (ACLs). One of the major challenges in network security management is ensuring the conformation of the distributed security implementations with the global security policy.

Sie möchten lieber vor Ort einkaufen?

Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.

Juristische Fachbuchhandlung
Georg Blendl

Parcellistraße 5 (Maxburg)
8033 München

Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen