TY - GEN N2 - This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks. DO - 10.1007/978-981-15-9317-8 DO - doi AB - This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks. T1 - The "essence" of network security :an end-to-end panorama / AU - Chakraborty, Mohuya, AU - Singh, Moutushi, AU - Balas, Valentina Emilia, AU - Mukhopadhyay, Indraneel, VL - volume 163 CN - TK5105.59 N1 - Includes author index. ID - 1433221 KW - Computer networks KW - Electrical engineering. KW - Machine learning. KW - Computer engineering. KW - Internet of things. KW - Embedded computer systems. KW - Big data. KW - Réseaux d'ordinateurs KW - Génie électrique. KW - Apprentissage automatique. KW - Ordinateurs KW - Internet des objets. KW - Systèmes enfouis (Informatique) KW - Données volumineuses. SN - 9811593175 SN - 9789811593178 TI - The "essence" of network security :an end-to-end panorama / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-15-9317-8 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-15-9317-8 ER -