• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Secure Communications: Applications and Management » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Secure Communications: Applications and Management

ISBN-13: 9780471499046 / Angielski / Twarda / 2002 / 346 str.

Roger J. Sutton
Secure Communications: Applications and Management Sutton, Roger J. 9780471499046 John Wiley & Sons - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Secure Communications: Applications and Management

ISBN-13: 9780471499046 / Angielski / Twarda / 2002 / 346 str.

Roger J. Sutton
cena 672,37 zł
(netto: 640,35 VAT:  5%)

Najniższa cena z 30 dni: 665,49 zł
Termin realizacji zamówienia:
ok. 30 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

If you need to know more about communication's security management, this is the perfect book for you...

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
* Explains the practical links between cryptography and telecommunications
* Addresses the pertinent issues of implementation of cryptography as a method of protecting information
* Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
* Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
* Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...

Kategorie:
Technologie
Kategorie BISAC:
Computers > Networking - General
Computers > Internet - Online Safety & Privacy
Wydawca:
John Wiley & Sons
Seria wydawnicza:
Wiley Series in Communications Networking & Distributed Syst
Język:
Angielski
ISBN-13:
9780471499046
Rok wydania:
2002
Ilość stron:
346
Waga:
0.72 kg
Wymiary:
25.15 x 17.02 x 2.49
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Glosariusz/słownik
Wydanie ilustrowane

"...well–written and accessible..." (Electronics Communication Engineering Journal, December 2002)

Preface

Acknowledgement

Glossary

Acronyms and Abbreviations

1. Threats and Solutions

The Technical Threats to Communications Security

Authentication

Confidentiality

Integrity

Availability

Compromising Emanation/Tempest Threats

2. An Introduction to Encryption and Security Management

Analogue Scrambling

Algorithms

Goodbye DES, Hello DES

Fundamentals in Key Management

Evaluating Encryption Equipment

3. Voice Security in Military Applications

Analogue Encryption of Naval Long range, HF Radio Communications

Stand–alone Digital Cipher Units in Land–based Operations

Radio Integrated Cipher Module

4. Telephone Security

Specific Threats to Telephone Operations

Network Technologies

Telephone Security Solutions

Key and Access Management

Network Implementation

Key Distribution

Summary

5. Secure GSM Systems

The Basic GSM Architecture

Standard GSM Secuirty Features

Custom Security for GSM Users

Key Management and Tools

GRPS General Packet Radio Systems

6. Security in Private VHF/UHF Radio Networks

Applications and Features

Threats

Countermeasures

Communications Network Design and Architecture

Hardware Components and Functions

Security and Key Management

Other Security Features

7. Electronic Protection Measures –
Frequency Hopping

Electronic Warfare (EW)

Electronic Protection Measures (EPM)

Military Applications

Network Architecture and Management

Characteristics of Frequency Hopping Networks

Key/Data Management and Tools

Hardware components

8. Link and Bulk Encryption

Basic Technology of Link Encryption

The Ciphering Process

Cryptographic Parameters

Key and Network Management

Military Link Security

9. Secure Fax Networks

Basic Facsimile Technology

Manual/Automatic Key Selection

Network Architecture

Key Management and Tools

Fax Over Satellite Links

10. PC Security

Security Threats and Risks

Implementation of Solutions

Access Protection

Boot–up Protection by On–Board Hardware with Smart Card

LAN Security

Model Application of PC Security

System Administration

11. Secure E–mail

The E–mail Scenario

Threats

Type and Motivation of Attackers

Methods of Attack

Countermeasures

Guidelines for E–mail Security

12. Secure Virtual Private Networks

Scenario

Definition VPN

Protocols

Packet Header Formats

Security Association List

Tunnel Table

Routing Tables

Packet Filtering

Threats and Countermeasures

Attacks within the Public Network

13. Military Data Communication

Applications

Data Terminals and their Operating Features

Technical Parameters

Security Management

Key Management

Combat Packet Data Networks

14. Managment, Support and Training

Environments of Security Management

Infrastructure and Planning

Operational Hierarchies

Training

Customer Support

Troubleshooting

References

Index

If you need to know more about communication′s security management, this is the perfect book for you.........

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
∗ Explains the practical links between cryptography and telecommunications

∗ Addresses the pertinent issues of implementation of cryptography as a method of protecting information

∗ Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material

∗ Provides practical solutions by network modelling and stimulating the reader′s imagination on how to deal with their own network protection

∗ Highlights the need for a structured infrastructure in an organisation′s security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on..........



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia