語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security in network functions virtua...
~
Zhang, Zonghua,
Security in network functions virtualization
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security in network functions virtualization/ Zonghua Zhang, Ahmed Meddahi.
作者:
Zhang, Zonghua,
其他作者:
Meddahi, Ahmed,
出版者:
Amsterdam :Elsevier, : 2017.,
面頁冊數:
1 online resource.
附註:
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
標題:
Computer networks - Security measures. -
電子資源:
https://www.sciencedirect.com/science/book/9781785482571
ISBN:
9780081023716 (electronic bk.)
Security in network functions virtualization
Zhang, Zonghua,
Security in network functions virtualization
[electronic resource] /Zonghua Zhang, Ahmed Meddahi. - Amsterdam :Elsevier,2017. - 1 online resource.
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
Includes bibliographical references (p. 227-247) and index.
Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation-- Data protection in NFV -- Conclusion.
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains amajor concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest inthe field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.
ISBN: 9780081023716 (electronic bk.)Subjects--Topical Terms:
555385
Computer networks
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.5833
Dewey Class. No.: 004.6
Security in network functions virtualization
LDR
:02803cam a2200277 a 4500
001
1043021
006
m o d
007
cr |||||||||||
008
211216s2017 ne a gob 001 0 eng d
020
$a
9780081023716 (electronic bk.)
020
$a
0081023715 (electronic bk.)
020
$a
9781785482571 (hardback)
020
$a
1785482572 (hardback)
035
$a
(OCoLC)1013815911
035
$a
on1013815911
040
$a
NLE
$b
eng
$c
NLE
$d
OCLCO
$d
OCLCF
$d
OPELS
$d
YDX
$d
MERER
$d
OCLCQ
$d
S2H
041
0
$a
eng
050
4
$a
TK5105.5833
082
0 4
$a
004.6
$2
23
100
1
$a
Zhang, Zonghua,
$e
author.
$3
1343843
245
1 0
$a
Security in network functions virtualization
$h
[electronic resource] /
$c
Zonghua Zhang, Ahmed Meddahi.
260
$a
Amsterdam :
$b
Elsevier,
$c
2017.
300
$a
1 online resource.
500
$a
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
504
$a
Includes bibliographical references (p. 227-247) and index.
505
0
$a
Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation-- Data protection in NFV -- Conclusion.
520
$a
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains amajor concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest inthe field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
655
0
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Meddahi, Ahmed,
$e
author.
$3
1343844
856
4 0
$u
https://www.sciencedirect.com/science/book/9781785482571
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入