Towards an integrated network security framework using the Y-Comm architecture
Mapp, Glenford E. and Crowcroft, Jon and Phan, Raphael (2010) Towards an integrated network security framework using the Y-Comm architecture. In: Handbook of electronic security and digital forensics. Jahankhani, Hamid and Watson, David Lilburn and Me, Gianluigi and Leonhardt, Frank, eds. World Scientific Publishing, Singapore, pp. 169-183. ISBN 9789812837035
Full text is not in this repository.
[Summary of the book containing this chapter :] The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.
|Item Type:||Book Section|
|Research Areas:||A. > School of Science and Technology > Computer and Communications Engineering
A. > School of Science and Technology > Computer Science > SensoLab group
|Depositing User:||Dr G E Mapp|
|Date Deposited:||05 Oct 2010 08:15|
|Last Modified:||13 Oct 2016 14:21|
Actions (login required)