
Evolving Networking Technologies
Developments and Future Directions
- English
- PDF
- Available on iOS & Android
Evolving Networking Technologies
Developments and Future Directions
About this book
EVOLVING NETWORKING TECHNOLOGIES
This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.
The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.
The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:
- Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
- Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
- Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.
Audience
This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- List of Figures
- List of Tables
- Foreword
- Preface
- Acknowledgments
- Acronyms
- Chapter 1 5G Technologies, Architecture and Protocols
- Chapter 2 Scope and Challenges of IoT and Blockchain Integration
- Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment
- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction
- Chapter 5 Network Security in Evolving Networking Technologies: Developments and Future Directions
- Chapter 6 The State of CDNs Today and What AI-Assisted CDN Means for the Future
- Chapter 7 Challenges and Opportunities in Smart City Network Management Through Blockchain and Cloud Computing
- Chapter 8 Role of IoT in Smart Homes and Offices
- Chapter 9 Role of IoT in the Prevention of COVID-19
- Chapter 10 Role of Satellites in Agriculture
- Chapter 11 Search Engine Evaluation Methodology
- Chapter 12 Synthesis and Analysis of Digital IIR Filters for Denoising ECG Signal on FPGA
- Chapter 13 Neural Networks and Their Applications
- Editors
- EULA
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app