This unique text on network security addresses the emerging concern of better detecting and preventing routers and other network devices from being attacked or compromised. It provides many examples of attacks, countermeasures and solutions.
The main aim of this book is to provide, in one organized volume, a comprehensive set of reference materials derived from the results of the ECOLEAD project. ECOLEAD, a 4-year European initiative, involved 28 organizations from academia, research and industry.
A practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily any IPv6 knowledge. It focuses on reliable and efficient operation of IPv6 implementations available today rather than on protocol specifications.
Companies depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux Systems.
This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture.
This is the first coherent book on SS7 and includes detailed background knowledge about the SS7 network protocols. The book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.