This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security technologies for the non-security-specialist non-mathematician. * describes recent developments, such as: the U.S. Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of non-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security technologies for the non-security-specialist non-mathematician. * describes recent developments, such as: the U.S. Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of non-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.
Warwick Ford, M.E., Ph.D., is Vice President for Strategic Technologies and Chief Technology Officer at VeriSign, Silicon Valley's premiere provider of identity, security, and payment services for e-commerce.
Michael Baum, J.D., M.B.A., CISSP, is Vice President for Practices and External Affairs at VeriSign.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: HPB-Red, Dallas, TX, USA
paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_383599782
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G0137994532I2N00
Anbieter: Ammareal, Morangis, Frankreich
Softcover. Zustand: Bon. Ancien livre de bibliothèque. Traces d'usure sur la couverture. Edition 1994. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Signs of wear on the cover. Edition 1994. Ammareal gives back up to 15% of this item's net price to charity organizations. Bestandsnummer des Verkäufers E-768-503
Anzahl: 1 verfügbar
Anbieter: Richard Booth's Bookshop, Hereford, Vereinigtes Königreich
HardBack. Zustand: Good. No Jacket. 520 pages. 1st editon. Good clean condition, no jacket.This book identifies and explains all the modern standardized methods of achieving network security in both TCPIP and OSI environments 8212; with a focus on intersystem, as opposed to intrasystem, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques.Covers such topics as cryptography, authentication, access control, and nonrepudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.For anyone required to design, develop, implement, market, or procure products based on specific network security standards. Bestandsnummer des Verkäufers 100133326
Anzahl: 1 verfügbar
Anbieter: 100POCKETS, Berkeley, CA, USA
Hardcover. Zustand: New. Firwt Edition, 2nd Printing. HARDBACK BRAND NEW COPY. Boards/Fine. DJ/None as Issued. Computer security standards. Reference/resource. Volume covers all in-place, standardized methods in both TCP/IP and OSI environments. 492 pgs, 17 chapters in 2 parts: Part I, TECHNICAL BACKGROUND: Chapt 2, (following Intro), Network Security Fundamentals; 3, Security in a Layered Protocol Architecture; 4, Cryptographic Techniques; 5, Authentication; 6, Access Control; 7, Confidentiality & Integrity; and 8, Non-repudiation. PART II, STANDARD PROTOCOLS & TECHNIQUES: 9, Security Architecture & Frameworks; 10, Standard Security Techniques; 11, Lower Layers Security Protocols; 12, Upper Layers Security Protocols; 13, Electronic Mail & EDI Security; 14, Directory Systems Security; 15, Network Management; 16, Security Evaluation Criteria; and. 17, Planning Considerations, followed by 3 appendices (Appendix A. The Standardization Process; B. ASN.1 Notation & Registration; and C, How to Obtain Standards Documents). Bestandsnummer des Verkäufers 018379
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Bestandsnummer des Verkäufers ABNR-121380
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Bestandsnummer des Verkäufers ABEOCT25-60845
Anbieter: ALLBOOKS1, Direk, SA, Australien
Brand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address. Bestandsnummer des Verkäufers SHAK60845
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 528 1st Edition. Bestandsnummer des Verkäufers 262611680
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 528. Bestandsnummer des Verkäufers 5269055
Anzahl: 1 verfügbar