Computer Communications Security / Edition 1

Computer Communications Security / Edition 1

by Warwick Ford
     
 

ISBN-10: 0137994532

ISBN-13: 9780137994533

Pub. Date: 09/30/1993

Publisher: Pearson Technology Group 2

This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments — with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and

…  See more details below

Overview

This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments — with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. Covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking. For anyone required to design, develop, implement, market, or procure products based on specific network security standards.

Product Details

ISBN-13:
9780137994533
Publisher:
Pearson Technology Group 2
Publication date:
09/30/1993
Edition description:
FACSIMILE
Pages:
520
Product dimensions:
7.50(w) x 9.25(h) x 1.05(d)

Table of Contents

I. TECHNICAL BACKGROUND.

2. Network Security Fundamentals.

3. Security in a Layered Protocol Architecture.

4. Cryptographic Techniques.

5. Authentication.

6. Access Control.

7. Confidentiality and Integrity.

8. Non-repudiation.

II. STANDARD PROTOCOLS AND TECHNIQUES.

9. Security Architecture and Frameworks.

10. Standard Security Techniques.

11. Lower Layers Security Protocols.

12. Upper Layers Security Protocols.

13. Electronic Mail and EDI Security.

14. Directory Systems Security.

15. Network Management.

16. Security Evaluation Criteria.

17. Planning Considerations.

Appendix A. The Standardization Process.

Appendix B. ASN.1 Notation and Registration.

Appendix C. How to Obtain Standards Documents.

Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >