Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Web security sourcebook
Building Internet Firewalls
Five dimensions of information security awareness
ACM SIGCAS Computers and Society
Behavior-based intrusion detection in mobile phone systems
Journal of Parallel and Distributed Computing - Problems in parallel and distributed computing: Solutions based on evolutionary paradigms
A Virtual Private Network for Virtual Enterprise Information Systems
WAIM '00 Proceedings of the First International Conference on Web-Age Information Management
Low Complexity Multiplication in a Finite Field Using Ring Representation
IEEE Transactions on Computers
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
An adaptive cryptographic engine for internet protocol security architectures
ACM Transactions on Design Automation of Electronic Systems (TODAES)
An artificial immune based intrusion detection model for computer and telecommunication systems
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
Hi-index | 4.10 |
The explosive growth of networking technology continues to redefine the rules for maintaining the privacy and integrity of electronic data. There is a staggering amount of personal, commercial, governmental, and military information in the various networking infrastructures worldwide. Almost anyone can reach out to the network, which often means almost anyone can reach in. In short, network security is an issue that can no longer be postponed. Fortunately, security measures do not have to be expensive or complicatedýa reality the networking community has only recently taken to heart. Network security itself, however, must be better understood and embraced, preferably before a compromise occurs. The articles in this issue are intended to alert you to the risks and some solutions and to encourage you to develop and implement security methodologies and strategies beforeýrather than afterýan incident. Strong cryptography is very powerful when it is done right, but it is not a panacea. Building a secure cryptographic system is easy to do badly and very difficult to do well. Unfortunately, most people can't tell the difference. In this article, the author conveys some of the lessons learned in designing, analyzing, and breaking cryptographic systems.