Secure internet routing
Premium Content

Access "Secure internet routing"

RH1 Amreesh-1.jpg

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.  Access >>>

Table of contents

  • The challenge of providing secure internet routing
  • How does internet routing work?
  • How can internet routing be secured?

Access TechTarget
Premium Content for Free.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

More Premium Content Accessible For Free

  • No more excuses: VDI is ready!
    BriForum-VDI-252.jpg
    E-Handbook

    There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualisation expert Brian Madden who directly ...

  • Taking stock of e-commerce systems
    CWE_140415_ezine_25p-MED.jpg
    E-Zine

    In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel ...

  • CW Europe - April 2015 Edition
    EUR_0415_ezine_pp18-MED.jpg
    E-Zine

    With the datacentre industry a major consumer of non-renewable energy, it continues to come under fire from environmental campaigners and users to ...