Secure Communication: Applications and Management / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $4.06
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Hardcover)
  • All (7) from $4.06   
  • New (2) from $130.52   
  • Used (5) from $4.06   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$130.52
Seller since 2008

Feedback rating:

(4535)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New Book. Shipped from UK within 4 to 14 business days. Established seller since 2000.

Ships from: Horcott Rd, Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$158.22
Seller since 2008

Feedback rating:

(17869)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

If you need to know more about communication's security management, this is the perfect book for you...

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
* Explains the practical links between cryptography and telecommunications
* Addresses the pertinent issues of implementation of cryptography as a method of protecting information
* Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
* Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
* Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...

Read More Show Less

Editorial Reviews

From the Publisher
"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)
From The Critics
Concentrating on the practical aspects of security policy, this book addresses the key problems faced by security managers, beginning with network connection, set-up, and maintenance. The book describes the workings of cryptography and its application to a variety of communications technologies, including telephones, GSM systems, radio networks, faxes, computers, and email. Military applications are emphasized and numerous diagrams illustrate key ideas. Sutton is a consultant. Annotation c. Book News, Inc., Portland, OR
Read More Show Less

Product Details

Table of Contents

Preface

Acknowledgement

Glossary

Acronyms and Abbreviations

1. Threats and Solutions

The Technical Threats to Communications Security

Authentication

Confidentiality

Integrity

Availability

Compromising Emanation/Tempest Threats

2. An Introduction to Encryption and Security Management

Analogue Scrambling

Algorithms

Goodbye DES, Hello DES

Fundamentals in Key Management

Evaluating Encryption Equipment

3. Voice Security in Military Applications

Analogue Encryption of Naval Long range, HF Radio Communications

Stand-alone Digital Cipher Units in Land-based Operations

Radio Integrated Cipher Module

4. Telephone Security

Specific Threats to Telephone Operations

Network Technologies

Telephone Security Solutions

Key and Access Management

Network Implementation

Key Distribution

Summary

5. Secure GSM Systems

The Basic GSM Architecture

Standard GSM Secuirty Features

Custom Security for GSM Users

Key Management and Tools

GRPS General Packet Radio Systems

6. Security in Private VHF/UHF Radio Networks

Applications and Features

Threats

Countermeasures

Communications Network Design and Architecture

Hardware Components and Functions

Security and Key Management

Other Security Features

7. Electronic Protection Measures -
Frequency Hopping

Electronic Warfare (EW)

Electronic Protection Measures (EPM)

Military Applications

Network Architecture and Management

Characteristics of Frequency Hopping Networks

Key/Data Management and Tools

Hardware components

8. Link and Bulk Encryption

Basic Technology of Link Encryption

The Ciphering Process

Cryptographic Parameters

Key and Network Management

Military Link Security

9. Secure Fax Networks

Basic Facsimile Technology

Manual/Automatic Key Selection

Network Architecture

Key Management and Tools

Fax Over Satellite Links

10. PC Security

Security Threats and Risks

Implementation of Solutions

Access Protection

Boot-up Protection by On-Board Hardware with Smart Card

LAN Security

Model Application of PC Security

System Administration

11. Secure E-mail

The E-mail Scenario

Threats

Type and Motivation of Attackers

Methods of Attack

Countermeasures

Guidelines for E-mail Security

12. Secure Virtual Private Networks

Scenario

Definition VPN

Protocols

Packet Header Formats

Security Association List

Tunnel Table

Routing Tables

Packet Filtering

Threats and Countermeasures

Attacks within the Public Network

13. Military Data Communication

Applications

Data Terminals and their Operating Features

Technical Parameters

Security Management

Key Management

Combat Packet Data Networks

14. Managment, Support and Training

Environments of Security Management

Infrastructure and Planning

Operational Hierarchies

Training

Customer Support

Troubleshooting

References

Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)