Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security in network functions virtua...
~
Zhang, Zonghua,
Security in network functions virtualization
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security in network functions virtualization/ Zonghua Zhang, Ahmed Meddahi.
Author:
Zhang, Zonghua,
other author:
Meddahi, Ahmed,
Published:
Amsterdam :Elsevier, : 2017.,
Description:
1 online resource.
Notes:
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
Subject:
Computer networks - Security measures. -
Online resource:
https://www.sciencedirect.com/science/book/9781785482571
ISBN:
9780081023716 (electronic bk.)
Security in network functions virtualization
Zhang, Zonghua,
Security in network functions virtualization
[electronic resource] /Zonghua Zhang, Ahmed Meddahi. - Amsterdam :Elsevier,2017. - 1 online resource.
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
Includes bibliographical references (p. 227-247) and index.
Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation-- Data protection in NFV -- Conclusion.
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains amajor concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest inthe field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.
ISBN: 9780081023716 (electronic bk.)Subjects--Topical Terms:
555385
Computer networks
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.5833
Dewey Class. No.: 004.6
Security in network functions virtualization
LDR
:02803cam a2200277 a 4500
001
1043021
006
m o d
007
cr |||||||||||
008
211216s2017 ne a gob 001 0 eng d
020
$a
9780081023716 (electronic bk.)
020
$a
0081023715 (electronic bk.)
020
$a
9781785482571 (hardback)
020
$a
1785482572 (hardback)
035
$a
(OCoLC)1013815911
035
$a
on1013815911
040
$a
NLE
$b
eng
$c
NLE
$d
OCLCO
$d
OCLCF
$d
OPELS
$d
YDX
$d
MERER
$d
OCLCQ
$d
S2H
041
0
$a
eng
050
4
$a
TK5105.5833
082
0 4
$a
004.6
$2
23
100
1
$a
Zhang, Zonghua,
$e
author.
$3
1343843
245
1 0
$a
Security in network functions virtualization
$h
[electronic resource] /
$c
Zonghua Zhang, Ahmed Meddahi.
260
$a
Amsterdam :
$b
Elsevier,
$c
2017.
300
$a
1 online resource.
500
$a
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
504
$a
Includes bibliographical references (p. 227-247) and index.
505
0
$a
Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation-- Data protection in NFV -- Conclusion.
520
$a
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains amajor concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest inthe field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
655
0
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Meddahi, Ahmed,
$e
author.
$3
1343844
856
4 0
$u
https://www.sciencedirect.com/science/book/9781785482571
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login