This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security technologies for the non-security-specialist non-mathematician. * describes recent developments, such as: the U.S. Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of non-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.
"Sinopsis" puede pertenecer a otra edición de este libro.
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security technologies for the non-security-specialist non-mathematician. * describes recent developments, such as: the U.S. Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of non-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.
Warwick Ford, M.E., Ph.D., is Vice President for Strategic Technologies and Chief Technology Officer at VeriSign, Silicon Valley's premiere provider of identity, security, and payment services for e-commerce.
Michael Baum, J.D., M.B.A., CISSP, is Vice President for Practices and External Affairs at VeriSign.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: HPB-Red, Dallas, TX, Estados Unidos de America
paperback. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Nº de ref. del artículo: S_383599782
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G0137994532I2N00
Cantidad disponible: 1 disponibles
Librería: Ammareal, Morangis, Francia
Softcover. Condición: Bon. Ancien livre de bibliothèque. Traces d'usure sur la couverture. Edition 1994. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Signs of wear on the cover. Edition 1994. Ammareal gives back up to 15% of this item's net price to charity organizations. Nº de ref. del artículo: E-768-503
Cantidad disponible: 1 disponibles
Librería: Richard Booth's Bookshop, Hereford, Reino Unido
HardBack. Condición: Good. No Jacket. 520 pages. 1st editon. Good clean condition, no jacket.This book identifies and explains all the modern standardized methods of achieving network security in both TCPIP and OSI environments 8212; with a focus on intersystem, as opposed to intrasystem, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques.Covers such topics as cryptography, authentication, access control, and nonrepudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.For anyone required to design, develop, implement, market, or procure products based on specific network security standards. Nº de ref. del artículo: 100133326
Cantidad disponible: 1 disponibles
Librería: 100POCKETS, Berkeley, CA, Estados Unidos de America
Hardcover. Condición: New. Firwt Edition, 2nd Printing. HARDBACK BRAND NEW COPY. Boards/Fine. DJ/None as Issued. Computer security standards. Reference/resource. Volume covers all in-place, standardized methods in both TCP/IP and OSI environments. 492 pgs, 17 chapters in 2 parts: Part I, TECHNICAL BACKGROUND: Chapt 2, (following Intro), Network Security Fundamentals; 3, Security in a Layered Protocol Architecture; 4, Cryptographic Techniques; 5, Authentication; 6, Access Control; 7, Confidentiality & Integrity; and 8, Non-repudiation. PART II, STANDARD PROTOCOLS & TECHNIQUES: 9, Security Architecture & Frameworks; 10, Standard Security Techniques; 11, Lower Layers Security Protocols; 12, Upper Layers Security Protocols; 13, Electronic Mail & EDI Security; 14, Directory Systems Security; 15, Network Management; 16, Security Evaluation Criteria; and. 17, Planning Considerations, followed by 3 appendices (Appendix A. The Standardization Process; B. ASN.1 Notation & Registration; and C, How to Obtain Standards Documents). Nº de ref. del artículo: 018379
Cantidad disponible: 1 disponibles
Librería: Romtrade Corp., STERLING HEIGHTS, MI, Estados Unidos de America
Condición: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Nº de ref. del artículo: ABNR-121380
Cantidad disponible: 1 disponibles
Librería: Basi6 International, Irving, TX, Estados Unidos de America
Condición: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Nº de ref. del artículo: ABEOCT25-60845
Cantidad disponible: 1 disponibles
Librería: ALLBOOKS1, Direk, SA, Australia
Brand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address. Nº de ref. del artículo: SHAK60845
Cantidad disponible: 1 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. pp. 528 1st Edition. Nº de ref. del artículo: 262611680
Cantidad disponible: 1 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. pp. 528. Nº de ref. del artículo: 5269055
Cantidad disponible: 1 disponibles