IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Game Theory for Network Security

Game Theory for Network Security
View Sample PDF
Copyright: 2014
Pages: 14
Source title: Game Theory Applications in Network Design
Source Author(s)/Editor(s): Sungwook Kim (Sogang University, South Korea)
DOI: 10.4018/978-1-4666-6050-2.ch006

Purchase

View Game Theory for Network Security on the publisher's website for pricing and purchasing information.

Abstract

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.

Related Content

Stojan Kitanov, Borislav Popovski, Toni Janevski. © 2019. 36 pages.
Noman Islam, Ainuddin Wahid Abdul Wahab. © 2019. 34 pages.
Ashraf Aboshosha, Mohamed B. El-Mashade, Ehab A. Hegazy. © 2019. 19 pages.
Adam Wong Yoon Khang, Mohamed Elshaikh Elobaid, Arnidza Ramli, Nadiatulhuda Zulkifli, Sevia Mahdaliza Idrus. © 2019. 15 pages.
Hesham Mohammed Ali Abdullah, A.V. Senthil Kumar. © 2019. 20 pages.
Elisavet Grigoriou. © 2019. 22 pages.
Anandkumar R, Kalpana R.. © 2019. 19 pages.
Body Bottom