5
1
Hardcover(2ND)
$119.00
-
PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
119.0
In Stock
Overview
This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances your ability to create and deploy secure architectures. It gives you the knowledge you need for improved productivity, whether you're setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.
Everything you need to develop proper access, control, and communication security on TCP/IP-based networks is covered. A complete review of the various cryptographic techniques available gives you the tools you need to protect all of your on-line transactions. Internet, transport and application layer security issues, including packet filtering techniques and application-layer gateways, are covered in detail. You also learn how to compare and assess the benefits of various security protocols and technologies. Here, for the first time, is an essential road map to Internet and intranet security for systems and network administrators, application developers, communications protocol designers, university students, and lecturers.
Everything you need to develop proper access, control, and communication security on TCP/IP-based networks is covered. A complete review of the various cryptographic techniques available gives you the tools you need to protect all of your on-line transactions. Internet, transport and application layer security issues, including packet filtering techniques and application-layer gateways, are covered in detail. You also learn how to compare and assess the benefits of various security protocols and technologies. Here, for the first time, is an essential road map to Internet and intranet security for systems and network administrators, application developers, communications protocol designers, university students, and lecturers.
Product Details
ISBN-13: | 9781580531665 |
---|---|
Publisher: | Artech House, Incorporated |
Publication date: | 10/31/2001 |
Series: | Artech House Computer Security Series |
Edition description: | 2ND |
Pages: | 432 |
Product dimensions: | 6.14(w) x 9.21(h) x 0.94(d) |
About the Author
Rolf Oppliger is a member of the Swiss Federal Office of Information Technology and Systems and performs research in computer and communications security for the Universities of Berne and Zuerich. He is a specialist in cryptographic protocols and their applications in computer networks and distributed systems. He received his Ph.D. in computer science at the University of Berne, Switzerland. Dr. Oppliger is the author of Authentication Systems for Secure Networks, also published by Artech House.
Table of Contents
Preface | xv | |
References | xxi | |
Acknowledgments | xxiii | |
I | Fundamentals | 1 |
1 | Terminology | 3 |
References | 10 | |
2 | TCP/IP Networking | 11 |
2.1 | History and Development | 12 |
2.2 | Internet | 15 |
2.3 | Internet Standardization | 17 |
2.4 | Internet Model | 35 |
References | 52 | |
3 | Attacks | 55 |
3.1 | Passive Attacks | 56 |
3.2 | Active Attacks | 58 |
References | 66 | |
4 | OSI Security Architecture | 69 |
4.1 | Introduction | 69 |
4.2 | Security Services | 72 |
4.3 | Security Mechanisms | 75 |
4.4 | Security Management | 78 |
References | 79 | |
5 | Cryptographic Techniques | 81 |
5.1 | Introduction | 81 |
5.2 | Cryptographic Hash Functions | 84 |
5.3 | Secret Key Cryptography | 87 |
5.4 | Public Key Cryptography | 90 |
5.5 | Digital Envelopes | 98 |
5.6 | Protection of Cryptographic Keys | 101 |
5.7 | Generation of Pseudorandom Bit Sequences | 102 |
5.8 | Legal Issues | 103 |
5.9 | Notation | 107 |
References | 109 | |
6 | Authentication and Key Distribution | 111 |
6.1 | Authentication | 111 |
6.2 | Key Distribution | 119 |
References | 122 | |
II | Access Control | 125 |
7 | Overview | 127 |
7.1 | Introduction | 128 |
7.2 | Basic Components | 133 |
7.3 | Sources for Further Information | 139 |
References | 140 | |
8 | Packet Filtering | 141 |
8.1 | Introduction | 141 |
8.2 | Packet-Filtering Rules | 145 |
8.3 | Packet-Filtering Products | 151 |
8.4 | Stateful Inspection | 156 |
8.5 | Conclusions | 157 |
References | 160 | |
9 | Circuit-Level Gateways | 161 |
9.1 | Introduction | 161 |
9.2 | SOCKS | 163 |
9.3 | Conclusions | 168 |
References | 169 | |
10 | Application-Level Gateways | 171 |
10.1 | Introduction | 171 |
10.2 | User Authentication and Authorization | 175 |
10.3 | Proxy Servers | 177 |
10.4 | Conclusions | 178 |
References | 180 | |
11 | Firewall Configurations | 181 |
11.1 | Dual-Homed Firewall Configurations | 181 |
11.2 | Screened Host Firewall Configurations | 185 |
11.3 | Screened Subnet Firewall Configurations | 186 |
11.4 | Network Address Translation | 188 |
11.5 | Protection Against Denial of Service | 190 |
11.6 | Firewall Certification | 192 |
References | 193 | |
12 | Conclusions and Outlook | 195 |
References | 201 | |
III | Communication Security | 203 |
13 | Network Access Layer Security Protocols | 205 |
13.1 | Introduction | 205 |
13.2 | Layer 2 Forwarding Protocol | 209 |
13.3 | Point-to-Point Tunneling Protocol | 210 |
13.4 | Layer 2 Tunneling Protocol | 218 |
13.5 | Conclusions | 219 |
References | 220 | |
14 | Internet Layer Security Protocols | 223 |
14.1 | Previous Work | 224 |
14.2 | IETF Standardization | 226 |
14.3 | IP Security Architecture | 227 |
14.4 | IPsec Protocols | 230 |
14.5 | Key Management Protocols | 236 |
14.6 | Implementations | 245 |
14.7 | Conclusions | 246 |
References | 247 | |
15 | Transport Layer Security Protocols | 251 |
15.1 | Previous Work | 251 |
15.2 | SSL Protocol | 252 |
15.3 | TLS Protocol | 269 |
15.4 | Firewall Tunneling | 274 |
15.5 | Conclusions | 277 |
References | 279 | |
16 | Application Layer Security Protocols | 283 |
16.1 | Security-Enhanced Application Protocols | 284 |
16.2 | Authentication and Key Distribution Systems | 295 |
16.3 | Conclusions | 307 |
References | 308 | |
17 | Message Security Protocols | 313 |
17.1 | Introduction | 313 |
17.2 | Secure Messaging Protocols | 314 |
17.3 | Conclusions | 325 |
References | 326 | |
18 | Conclusions and Outlook | 329 |
Reference | 333 | |
IV | Discussion | 335 |
19 | Public Key Infrastructures | 337 |
19.1 | Introduction | 337 |
19.2 | Public Key Certificates | 339 |
19.3 | Attribute Certificates | 342 |
19.4 | IETF PKIX WG | 345 |
19.5 | Certificate Revocation | 348 |
19.6 | Conclusions | 352 |
References | 356 | |
20 | Electronic Commerce | 361 |
References | 366 | |
21 | Risk Management | 369 |
21.1 | Introduction | 369 |
21.2 | Formal Risk Analysis | 371 |
21.3 | Alternative Approaches and Technologies | 373 |
21.4 | Conclusions | 375 |
References | 376 | |
Epilogue | 379 | |
References | 381 | |
Abbreviations and Acronyms | 383 | |
About the Author | 393 | |
Index | 395 |
From the B&N Reads Blog
Page 1 of