Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Secure Communications: Applications and Management - ISBN 9780471499046

Secure Communications: Applications and Management

ISBN 9780471499046

Autor: Roger J. Sutton

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 711,90 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780471499046

ISBN10:      

0471499048

Autor:      

Roger J. Sutton

Oprawa:      

Hardback

Rok Wydania:      

2001-12-27

Ilość stron:      

346

Wymiary:      

249x177

Tematy:      

TJ

If you need to know more about communication′s security management, this is the perfect book for you.........
Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
∗ Explains the practical links between cryptography and telecommunications
∗ Addresses the pertinent issues of implementation of cryptography as a method of protecting information
∗ Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
∗ Provides practical solutions by network modelling and stimulating the reader′s imagination on how to deal with their own network protection
∗ Highlights the need for a structured infrastructure in an organisation′s security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on..........

Spis treści:
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromisin g Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand–alone Digital Cipher Units in Land–based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures –
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot–up Protection by On–Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E–mail
The E–mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E–mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index

Okładka tylna:
If you need to know more about communication′s security management, this is the perfect book for you.........
Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
∗ Explains the practical links between cryptography and telecommunications
∗ Addresses the pertinent issues of implementation of cryptography as a method of protecting information
∗ Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
∗ Provides practical solutions by network modelling and stim ulating the reader′s imagination on how to deal with their own network protection
∗ Highlights the need for a structured infrastructure in an organisation′s security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on..........

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy