Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security in network functions virtua...
~
Meddahi, Ahmed,
Security in network functions virtualization
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security in network functions virtualizationZonghua Zhang, Ahmed Meddahi.
Author:
Zhang, Zonghua,
other author:
Meddahi, Ahmed,
Published:
Amsterdam :Elsevier,2017.
Description:
1 online resource.
Notes:
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
Subject:
Computer networksSecurity measures.
Online resource:
https://www.sciencedirect.com/science/book/9781785482571
ISBN:
9780081023716 (electronic bk.)
Security in network functions virtualization
Zhang, Zonghua,
Security in network functions virtualization
[electronic resource] /Zonghua Zhang, Ahmed Meddahi. - Amsterdam :Elsevier,2017. - 1 online resource.
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
Includes bibliographical references (p. 227-247) and index.
Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation-- Data protection in NFV -- Conclusion.
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains amajor concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest inthe field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.
ISBN: 9780081023716 (electronic bk.)Subjects--Topical Terms:
185597
Computer networks
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.5833
Dewey Class. No.: 004.6
Security in network functions virtualization
LDR
:02803cmm a2200277 a 4500
001
601529
006
m o d
007
cr |||||||||||
008
211110s2017 ne a gob 001 0 eng d
020
$a
9780081023716 (electronic bk.)
020
$a
0081023715 (electronic bk.)
020
$a
9781785482571 (hardback)
020
$a
1785482572 (hardback)
035
$a
(OCoLC)1013815911
035
$a
on1013815911
040
$a
NLE
$b
eng
$c
NLE
$d
OCLCO
$d
OCLCF
$d
OPELS
$d
YDX
$d
MERER
$d
OCLCQ
$d
S2H
041
0
$a
eng
050
4
$a
TK5105.5833
082
0 4
$a
004.6
$2
23
100
1
$a
Zhang, Zonghua,
$e
author.
$3
896698
245
1 0
$a
Security in network functions virtualization
$h
[electronic resource] /
$c
Zonghua Zhang, Ahmed Meddahi.
260
$a
Amsterdam :
$b
Elsevier,
$c
2017.
300
$a
1 online resource.
500
$a
NFV Management and Orchestration Use Case Driven Security Threat Analysis NFV-based Security Management Identity and Access Management in NFV Intrusion Prevention and Detection in NFV Network Isolation Data Protection in NFV.
504
$a
Includes bibliographical references (p. 227-247) and index.
505
0
$a
Introduction -- NFV management and orchestration -- Use case driven security threat analysis -- NFV-based security management -- Identity and access management in NFV -- Intrusion prevention and detection in NFV -- Network isolation-- Data protection in NFV -- Conclusion.
520
$a
The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains amajor concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest inthe field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
655
0
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Meddahi, Ahmed,
$e
author.
$3
896699
856
4 0
$u
https://www.sciencedirect.com/science/book/9781785482571
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000200785
電子館藏
1圖書
電子書
EB TK5105.5833 2017
一般使用(Normal)
in cat dept.
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9781785482571
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login