Internet And Intranet Security

Internet And Intranet Security

by Rolf Oppliger

Hardcover(2ND)

$119.00 View All Available Formats & Editions
Want it by Tuesday, November 27 Order now and choose Expedited Shipping during checkout.

Product Details

ISBN-13: 9781580531665
Publisher: Artech House, Incorporated
Publication date: 10/31/2001
Series: Artech House Computer Security Series
Edition description: 2ND
Pages: 432
Product dimensions: 6.14(w) x 9.21(h) x 0.94(d)

Table of Contents

Prefacexv
Referencesxxi
Acknowledgmentsxxiii
IFundamentals1
1Terminology3
References10
2TCP/IP Networking11
2.1History and Development12
2.2Internet15
2.3Internet Standardization17
2.4Internet Model35
References52
3Attacks55
3.1Passive Attacks56
3.2Active Attacks58
References66
4OSI Security Architecture69
4.1Introduction69
4.2Security Services72
4.3Security Mechanisms75
4.4Security Management78
References79
5Cryptographic Techniques81
5.1Introduction81
5.2Cryptographic Hash Functions84
5.3Secret Key Cryptography87
5.4Public Key Cryptography90
5.5Digital Envelopes98
5.6Protection of Cryptographic Keys101
5.7Generation of Pseudorandom Bit Sequences102
5.8Legal Issues103
5.9Notation107
References109
6Authentication and Key Distribution111
6.1Authentication111
6.2Key Distribution119
References122
IIAccess Control125
7Overview127
7.1Introduction128
7.2Basic Components133
7.3Sources for Further Information139
References140
8Packet Filtering141
8.1Introduction141
8.2Packet-Filtering Rules145
8.3Packet-Filtering Products151
8.4Stateful Inspection156
8.5Conclusions157
References160
9Circuit-Level Gateways161
9.1Introduction161
9.2SOCKS163
9.3Conclusions168
References169
10Application-Level Gateways171
10.1Introduction171
10.2User Authentication and Authorization175
10.3Proxy Servers177
10.4Conclusions178
References180
11Firewall Configurations181
11.1Dual-Homed Firewall Configurations181
11.2Screened Host Firewall Configurations185
11.3Screened Subnet Firewall Configurations186
11.4Network Address Translation188
11.5Protection Against Denial of Service190
11.6Firewall Certification192
References193
12Conclusions and Outlook195
References201
IIICommunication Security203
13Network Access Layer Security Protocols205
13.1Introduction205
13.2Layer 2 Forwarding Protocol209
13.3Point-to-Point Tunneling Protocol210
13.4Layer 2 Tunneling Protocol218
13.5Conclusions219
References220
14Internet Layer Security Protocols223
14.1Previous Work224
14.2IETF Standardization226
14.3IP Security Architecture227
14.4IPsec Protocols230
14.5Key Management Protocols236
14.6Implementations245
14.7Conclusions246
References247
15Transport Layer Security Protocols251
15.1Previous Work251
15.2SSL Protocol252
15.3TLS Protocol269
15.4Firewall Tunneling274
15.5Conclusions277
References279
16Application Layer Security Protocols283
16.1Security-Enhanced Application Protocols284
16.2Authentication and Key Distribution Systems295
16.3Conclusions307
References308
17Message Security Protocols313
17.1Introduction313
17.2Secure Messaging Protocols314
17.3Conclusions325
References326
18Conclusions and Outlook329
Reference333
IVDiscussion335
19Public Key Infrastructures337
19.1Introduction337
19.2Public Key Certificates339
19.3Attribute Certificates342
19.4IETF PKIX WG345
19.5Certificate Revocation348
19.6Conclusions352
References356
20Electronic Commerce361
References366
21Risk Management369
21.1Introduction369
21.2Formal Risk Analysis371
21.3Alternative Approaches and Technologies373
21.4Conclusions375
References376
Epilogue379
References381
Abbreviations and Acronyms383
About the Author393
Index395

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews