Internet And Intranet Security

Internet And Intranet Security

by Rolf Oppliger
Internet And Intranet Security

Internet And Intranet Security

by Rolf Oppliger

Hardcover(2ND)

$119.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances your ability to create and deploy secure architectures. It gives you the knowledge you need for improved productivity, whether you're setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.

Everything you need to develop proper access, control, and communication security on TCP/IP-based networks is covered. A complete review of the various cryptographic techniques available gives you the tools you need to protect all of your on-line transactions. Internet, transport and application layer security issues, including packet filtering techniques and application-layer gateways, are covered in detail. You also learn how to compare and assess the benefits of various security protocols and technologies. Here, for the first time, is an essential road map to Internet and intranet security for systems and network administrators, application developers, communications protocol designers, university students, and lecturers.


Product Details

ISBN-13: 9781580531665
Publisher: Artech House, Incorporated
Publication date: 10/31/2001
Series: Artech House Computer Security Series
Edition description: 2ND
Pages: 432
Product dimensions: 6.14(w) x 9.21(h) x 0.94(d)

About the Author

Rolf Oppliger is a member of the Swiss Federal Office of Information Technology and Systems and performs research in computer and communications security for the Universities of Berne and Zuerich. He is a specialist in cryptographic protocols and their applications in computer networks and distributed systems. He received his Ph.D. in computer science at the University of Berne, Switzerland. Dr. Oppliger is the author of Authentication Systems for Secure Networks, also published by Artech House.

Table of Contents

Prefacexv
Referencesxxi
Acknowledgmentsxxiii
IFundamentals1
1Terminology3
References10
2TCP/IP Networking11
2.1History and Development12
2.2Internet15
2.3Internet Standardization17
2.4Internet Model35
References52
3Attacks55
3.1Passive Attacks56
3.2Active Attacks58
References66
4OSI Security Architecture69
4.1Introduction69
4.2Security Services72
4.3Security Mechanisms75
4.4Security Management78
References79
5Cryptographic Techniques81
5.1Introduction81
5.2Cryptographic Hash Functions84
5.3Secret Key Cryptography87
5.4Public Key Cryptography90
5.5Digital Envelopes98
5.6Protection of Cryptographic Keys101
5.7Generation of Pseudorandom Bit Sequences102
5.8Legal Issues103
5.9Notation107
References109
6Authentication and Key Distribution111
6.1Authentication111
6.2Key Distribution119
References122
IIAccess Control125
7Overview127
7.1Introduction128
7.2Basic Components133
7.3Sources for Further Information139
References140
8Packet Filtering141
8.1Introduction141
8.2Packet-Filtering Rules145
8.3Packet-Filtering Products151
8.4Stateful Inspection156
8.5Conclusions157
References160
9Circuit-Level Gateways161
9.1Introduction161
9.2SOCKS163
9.3Conclusions168
References169
10Application-Level Gateways171
10.1Introduction171
10.2User Authentication and Authorization175
10.3Proxy Servers177
10.4Conclusions178
References180
11Firewall Configurations181
11.1Dual-Homed Firewall Configurations181
11.2Screened Host Firewall Configurations185
11.3Screened Subnet Firewall Configurations186
11.4Network Address Translation188
11.5Protection Against Denial of Service190
11.6Firewall Certification192
References193
12Conclusions and Outlook195
References201
IIICommunication Security203
13Network Access Layer Security Protocols205
13.1Introduction205
13.2Layer 2 Forwarding Protocol209
13.3Point-to-Point Tunneling Protocol210
13.4Layer 2 Tunneling Protocol218
13.5Conclusions219
References220
14Internet Layer Security Protocols223
14.1Previous Work224
14.2IETF Standardization226
14.3IP Security Architecture227
14.4IPsec Protocols230
14.5Key Management Protocols236
14.6Implementations245
14.7Conclusions246
References247
15Transport Layer Security Protocols251
15.1Previous Work251
15.2SSL Protocol252
15.3TLS Protocol269
15.4Firewall Tunneling274
15.5Conclusions277
References279
16Application Layer Security Protocols283
16.1Security-Enhanced Application Protocols284
16.2Authentication and Key Distribution Systems295
16.3Conclusions307
References308
17Message Security Protocols313
17.1Introduction313
17.2Secure Messaging Protocols314
17.3Conclusions325
References326
18Conclusions and Outlook329
Reference333
IVDiscussion335
19Public Key Infrastructures337
19.1Introduction337
19.2Public Key Certificates339
19.3Attribute Certificates342
19.4IETF PKIX WG345
19.5Certificate Revocation348
19.6Conclusions352
References356
20Electronic Commerce361
References366
21Risk Management369
21.1Introduction369
21.2Formal Risk Analysis371
21.3Alternative Approaches and Technologies373
21.4Conclusions375
References376
Epilogue379
References381
Abbreviations and Acronyms383
About the Author393
Index395
From the B&N Reads Blog

Customer Reviews