04034nam 22006975 450 991029897580332120200629200530.03-319-10371-710.1007/978-3-319-10371-6(CKB)3710000000248957(EBL)1965207(OCoLC)893675424(SSID)ssj0001353807(PQKBManifestationID)11895981(PQKBTitleCode)TC0001353807(PQKBWorkID)11315827(PQKB)10149390(MiAaPQ)EBC1965207(DE-He213)978-3-319-10371-6(PPN)18134856X(EXLCZ)99371000000024895720140923d2014 u| 0engur|n|---|||||txtccrAutomated Firewall Analytics Design, Configuration and Optimization /by Ehab Al-Shaer1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (145 p.)Description based upon print version of record.3-319-10370-9 Includes bibliographical references at the end of each chapters and index.Classification and Discovery of Firewalls Policy Anomalies -- Modeling and Verification of Firewall and IPSec Policies using Binary Decision Diagrams -- Specification and Refinement of a Conflict-Free Distributed Firewall Configuration Language -- Design and Configuration of Firewall Architecture Under Risk, Usability and Cost Constraints -- Dynamic Firewall Configuration Optimization. .This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.Computer securityComputer networksData encryption (Computer science)ComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer security.Computer networks.Data encryption (Computer science)Computers.Systems and Data Security.Computer Communication Networks.Cryptology.Information Systems and Communication Service.004004.6005.7005.8Al-Shaer Ehabauthttp://id.loc.gov/vocabulary/relators/aut905473BOOK9910298975803321Automated Firewall Analytics2060912UNINA