Evolving networking technologies: developments and future directions (Record no. 63026)

MARC details
000 -LEADER
fixed length control field 03438nam a2200241 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119836650
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.38152 SHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Sharma, Kanta Prasad (Ed.)
245 ## - TITLE STATEMENT
Title Evolving networking technologies: developments and future directions
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. 2024
520 ## - SUMMARY, ETC.
Summary, etc. EVOLVING NETWORKING TECHNOLOGIES<br/>This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.<br/><br/>In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.<br/><br/>The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.<br/><br/>The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:<br/><br/>Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.<br/>Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.<br/>Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.<br/>Audience<br/><br/>This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Circuits
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Devices
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Engineered Materials
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Dielectrics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Plasmas
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IEEE-Wiley Semiconductor Ebooks
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Gupta, Shaurya
Relator term Co editor
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Sharma, Ashish
Relator term Co editor
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Dac-Nhuong Le
Relator term Co editor
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ieeexplore.ieee.org/servlet/opac?bknumber=10523214">https://ieeexplore.ieee.org/servlet/opac?bknumber=10523214</a>
Link text Click here to access e-book
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E- Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Date last seen Uniform Resource Identifier Price effective from Koha item type
    Dewey Decimal Classification IEEE-Wiley Semiconductor Ebooks     IIT Gandhinagar IIT Gandhinagar 17/06/2025   621.38152 SHA 17/06/2025 https://ieeexplore.ieee.org/servlet/opac?bknumber=10523214 17/06/2025 E- Books


Copyright ©  2022 IIT Gandhinagar Library. All Rights Reserved.