| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910298975803321 |
|
|
Autore |
Al-Shaer Ehab |
|
|
Titolo |
Automated Firewall Analytics : Design, Configuration and Optimization / / by Ehab Al-Shaer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2014.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (145 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer networks |
Data encryption (Computer science) |
Computers |
Systems and Data Security |
Computer Communication Networks |
Cryptology |
Information Systems and Communication Service |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Classification and Discovery of Firewalls Policy Anomalies -- Modeling and Verification of Firewall and IPSec Policies using Binary Decision Diagrams -- Specification and Refinement of a Conflict-Free Distributed Firewall Configuration Language -- Design and Configuration of Firewall Architecture Under Risk, Usability and Cost Constraints -- Dynamic Firewall Configuration Optimization. . |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of- |
|
|
|
|
|
|
|
|
|
|
the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference. |
|
|
|
|
|
| |