Computer Communications Security
Principles, Standard Protocols and Techniques
Seiten
1993
Prentice Hall (Verlag)
978-0-13-799453-3 (ISBN)
Prentice Hall (Verlag)
978-0-13-799453-3 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This book covers all the standardized methods of retrieving network security in both TCP1IP & OSF environments. Part 1 is a tutorial introduction to computer network security; Part 2 describes security standards, protocols, and techniques.
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security technologies for the non-security-specialist non-mathematician. * describes recent developments, such as: the U.S.
Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of non-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security technologies for the non-security-specialist non-mathematician. * describes recent developments, such as: the U.S.
Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of non-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.
I. TECHNICAL BACKGROUND.
2. Network Security Fundamentals.
3. Security in a Layered Protocol Architecture.
4. Cryptographic Techniques.
5. Authentication.
6. Access Control.
7. Confidentiality and Integrity.
8. Non-repudiation.
II. STANDARD PROTOCOLS AND TECHNIQUES.
9. Security Architecture and Frameworks.
10. Standard Security Techniques.
11. Lower Layers Security Protocols.
12. Upper Layers Security Protocols.
13. Electronic Mail and EDI Security.
14. Directory Systems Security.
15. Network Management.
16. Security Evaluation Criteria.
17. Planning Considerations.
Appendix A. The Standardization Process.
Appendix B. ASN.1 Notation and Registration.
Appendix C. How to Obtain Standards Documents.
Index.
Erscheint lt. Verlag | 1.10.1993 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-13-799453-2 / 0137994532 |
ISBN-13 | 978-0-13-799453-3 / 9780137994533 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Hardcover (2012)
Westermann Schulbuchverlag
CHF 44,90
Schulbuch Klassen 7/8 (G9)
Buch | Hardcover (2015)
Klett (Verlag)
CHF 29,90
Buch | Softcover (2004)
Cornelsen Verlag
CHF 23,90