Secure internet routing
Premium Content

Access "Secure internet routing"

RH1 Amreesh-1.jpg

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.  Access >>>

Table of contents

  • The challenge of providing secure internet routing
  • How does internet routing work?
  • How can internet routing be secured?

Access TechTarget
Premium Content for Free.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

More Premium Content Accessible For Free

  • CW500: Reducing complexity in IT: National Trust CIO Sarah Flannigan
    Sarah-Flannigan-May-2015-252.jpg
    E-Handbook

    How do you migrate from legacy to simplicity? National Trust CIO Sarah Flannigan offers some tips in this presentation.

  • CW500: Reducing complexity in IT: Aldermore Bank CTO Peter McElwaine-Johnn
    Reducing-IT-Complexity-CW500-252.jpg
    E-Handbook

    How do you migrate from legacy to simplicity? Aldermore Bank CTO Peter McElwaine-Johnn offers some tips in this presentation.

  • Microservices and DevOps are changing software development
    CWE_260515_ezine-MED.jpg
    E-Zine

    In this week's Computer Weekly, we talk to Hailo about its software development approach, which sees the taxi app use microservices and DevOps ...