- Home
- Computers
- Networking
- Managing Security Services in Heterogenous Networks (Confidentiality, Integrity, Availability, Authentication, and Access Control) - 9780367647452
Managing Security Services in Heterogenous Networks (Confidentiality, Integrity, Availability, Authentication, and Access Control) - 9780367647452
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Overview
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.
The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at:
- Access control methods in cloud-enabled Internet of Things
- Secure routing algorithms for mobile ad-hoc networks
- Building security trust in mobile ad-hoc networks using soft computing methods
- The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain
- Password authentication and keystroke biometrics
- Health care data analytics over Big Data
- Bluetooth: and its open issues for managing security services in heterogenous networks
Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.








