Premium Content

Access "Secure internet routing"

RH1 Amreesh-1.jpg

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.  Access >>>

Table of contents

  • The challenge of providing secure internet routing
  • How does internet routing work?
  • How can internet routing be secured?

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Personal skills for professional success: influencing
    Personal-skills-for-professional-success-Influencing-(1379929668_11).jpg
    E-Handbook

    Mastering influencing skills opens doors for your career by improving not just the ways in which you interact with important groups of people, but ...

  • Optimising your OmniPayments: Consumers, payments and the future
    Optimising-your-OmniPayments-(1379605786_211).jpg
    E-Handbook

    Catering to the consumers of today means helping them pay how they want to. Yet with the plethora of options available in the market, it is vital for...

  • Key legal and commercial issues with data centre services
    Key-legal-and-commercial-issues-with-data-centre-services-(1378741195_134).jpg
    E-Handbook

    This briefing from law-firm DLA Piper looks at the main types of data centre services that are available on the market, common pitfalls to avoid when...