Premium Content

Access "Secure internet routing"

RH1 Amreesh-1.jpg

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.  Access >>>

Table of contents

  • The challenge of providing secure internet routing
  • How does internet routing work?
  • How can internet routing be secured?

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Calculating Cloud ROI : From the Customer Perspective
    Calculating-Cloud-ROI---From-the-Customer-Perspective-(1363356380_260).jpg
    E-Handbook

    Marketing hype claims that cloud computing can help any enterprise meet most IT service needs at a lower total cost of ownership (TCO) and higher ...

  • Benefits Management: How to increase the business value of your IT projects
    Benefits-Management-Increase-the-business-value-IT-projects-(1360945240_963).jpg
    E-Handbook

    Information systems and technology (IS/IT) are now essential components of the majority of businesses, allowing them to achieve greater efficiency of...

  • An Introduction to Quantum Lifecycle Management
    An-Introduction-to-Quantum-Lifecycle-Management-(1358517152_735).jpg
    E-Handbook

    Quantum Lifecycle Management (QLM) will enable the “Internet of Things” to have an impact on business and the world at large in a way similar to the ...