Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
This book is a select collection of edited papers from the International Conference on Security of Information and Networks (SIN 2007) on the main theme of Info
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks.
If we are to believe in Moore’s law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of co