Securing Converged IP Networks
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awarene...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton, FL
Auerbach Publications
2006
© 2006 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-364523 | ||
005 | 20209610285 | ||
008 | 201006 2006 -US a|| 01 |#eng#D | ||
020 | 0 | 0 | |a 0849375800 |q hardback |
020 | 0 | 0 | |a 9780849375804 |q hardback |
040 | # | # | |a DST |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.585 |b .M325 2006 |
100 | 1 | 0 | |a Macaulay, Tyson |e author |
245 | 1 | 0 | |a Securing Converged IP Networks |c Tyson Macaulay |
264 | # | 1 | |a Boca Raton, FL |b Auerbach Publications |c 2006 |
264 | # | 1 | |c © 2006 |
300 | 0 | 0 | |a 268 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | 0 | 0 | |a Includes bibliographical references and index |
520 | # | # | |a Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management. Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a wide range of ICT security threats and vulnerabilities. Later chapters discuss controls and safeguards in terms of management, as well as, technical, and operational tools that can reduce the likelihood of wide range of risks. It also provides recommendations for managing the assurance, implementation and operation of converged ICT network infrastructures and examines the future of ICT security and assurance under IP convergence. |
650 | # | 0 | |a TCP/IP (Computer network protocol) |
650 | # | 0 | |a Convergence (Telecommunication) |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=364523 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00520##a007.2||00520##b007.2|| |