logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Guide To Security In Sdn And Nfv Challenges Opportunities And Applications 1st Edition Shao Ying Zhu

  • SKU: BELL-6789952
Guide To Security In Sdn And Nfv Challenges Opportunities And Applications 1st Edition Shao Ying Zhu
$ 31.00 $ 45.00 (-31%)

4.8

84 reviews

Guide To Security In Sdn And Nfv Challenges Opportunities And Applications 1st Edition Shao Ying Zhu instant download after payment.

Publisher: Springer International Publishing
File Extension: PDF
File size: 6.85 MB
Pages: 342
Author: Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill (eds.)
ISBN: 9783319646527, 9783319646534, 3319646524, 3319646532
Language: English
Year: 2017
Edition: 1

Product desciption

Guide To Security In Sdn And Nfv Challenges Opportunities And Applications 1st Edition Shao Ying Zhu by Shao Ying Zhu, Sandra Scott-hayward, Ludovic Jacquin, Richard Hill (eds.) 9783319646527, 9783319646534, 3319646524, 3319646532 instant download after payment.

          This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks.

          Topics and features: introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security; discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation; reviews a range of  specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN; describes the implementation of a virtual home gateway, and a project that  combines dynamic security monitoring with big-data analytics to detect network-wide threats; examines the security  implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G; investigates security in the Observe, Orient, Decide and Act  (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture;includes review questions in each chapter, to test the reader’s understanding of each of the key concepts  described.
          This informative and practical volume is an essential resource for researchers interested in the potential  of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. 

Related Products