- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bücher über Kryptologie, die Algorithmen und Verschlüsselungstechniken beschreiben, gibt es in Hülle und Fülle. Aber es gibt nur wenige Bücher, die sich - wie "Secure Communications" - mit der praktischen Seite der sicheren Sprachübertragung beschäftigen. Autor Roger Sutton diskutiert hier verschiedene Kommunikationsmedien, wobei er insbesondere auf technische Fragen und Sicherheitsrisiken eingeht und verschiedene Möglichkeiten zur Problemlösung aufgezeigt. Zahlreiche durchgearbeitete Beispiele für Netzwerke runden den Text ab.
Andere Kunden interessierten sich auch für
- Nong YeSecure Computer and Network Systems154,99 €
- Andrei GurtovHost Identity Protocol (Hip)119,99 €
- Silke HoltmannsCellular Authentication for Mobile and Internet Services110,99 €
- Frank StajanoSecurity for Ubiquitous Computing137,99 €
- Matthias Chr. WoelfelDistant Speech Recognition145,99 €
- Abhijit BelapurkarDistributed Systems Security114,99 €
- Xiaodong LinVehicular AD Hoc Network Security and Privacy147,99 €
-
-
-
Bücher über Kryptologie, die Algorithmen und Verschlüsselungstechniken beschreiben, gibt es in Hülle und Fülle. Aber es gibt nur wenige Bücher, die sich - wie "Secure Communications" - mit der praktischen Seite der sicheren Sprachübertragung beschäftigen. Autor Roger Sutton diskutiert hier verschiedene Kommunikationsmedien, wobei er insbesondere auf technische Fragen und Sicherheitsrisiken eingeht und verschiedene Möglichkeiten zur Problemlösung aufgezeigt. Zahlreiche durchgearbeitete Beispiele für Netzwerke runden den Text ab.
Produktdetails
- Produktdetails
- Wiley Series in Communications Technology
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 346
- Erscheinungstermin: 15. Februar 2002
- Englisch
- Abmessung: 251mm x 170mm x 25mm
- Gewicht: 728g
- ISBN-13: 9780471499046
- ISBN-10: 0471499048
- Artikelnr.: 10073530
- Wiley Series in Communications Technology
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 346
- Erscheinungstermin: 15. Februar 2002
- Englisch
- Abmessung: 251mm x 170mm x 25mm
- Gewicht: 728g
- ISBN-13: 9780471499046
- ISBN-10: 0471499048
- Artikelnr.: 10073530
Roger J. Sutton is the author of Secure Communications: Applications and Management, published by Wiley.
Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and
Solutions The Technical Threats to Communications Security Authentication
Confidentiality Integrity Availability Compromising Emanation/Tempest
Threats 2. An Introduction to Encryption and Security Management Analogue
Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management
Evaluating Encryption Equipment 3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated
Cipher Module 4. Telephone Security Specific Threats to Telephone
Operations Network Technologies Telephone Security Solutions Key and Access
Management Network Implementation Key Distribution Summary 5. Secure GSM
Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom
Security for GSM Users Key Management and Tools GRPS General Packet Radio
Systems 6. Security in Private VHF/UHF Radio Networks Applications and
Features Threats Countermeasures Communications Network Design and
Architecture Hardware Components and Functions Security and Key Management
Other Security Features 7. Electronic Protection Measures - Frequency
Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM)
Military Applications Network Architecture and Management Characteristics
of Frequency Hopping Networks Key/Data Management and Tools Hardware
components 8. Link and Bulk Encryption Basic Technology of Link Encryption
The Ciphering Process Cryptographic Parameters Key and Network Management
Military Link Security 9. Secure Fax Networks Basic Facsimile Technology
Manual/Automatic Key Selection Network Architecture Key Management and
Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks
Implementation of Solutions Access Protection Boot-up Protection by
On-Board Hardware with Smart Card LAN Security Model Application of PC
Security System Administration 11. Secure E-mail The E-mail Scenario
Threats Type and Motivation of Attackers Methods of Attack Countermeasures
Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario
Definition VPN Protocols Packet Header Formats Security Association List
Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures
Attacks within the Public Network 13. Military Data Communication
Applications Data Terminals and their Operating Features Technical
Parameters Security Management Key Management Combat Packet Data Networks
14. Managment, Support and Training Environments of Security Management
Infrastructure and Planning Operational Hierarchies Training Customer
Support Troubleshooting References Index
Solutions The Technical Threats to Communications Security Authentication
Confidentiality Integrity Availability Compromising Emanation/Tempest
Threats 2. An Introduction to Encryption and Security Management Analogue
Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management
Evaluating Encryption Equipment 3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated
Cipher Module 4. Telephone Security Specific Threats to Telephone
Operations Network Technologies Telephone Security Solutions Key and Access
Management Network Implementation Key Distribution Summary 5. Secure GSM
Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom
Security for GSM Users Key Management and Tools GRPS General Packet Radio
Systems 6. Security in Private VHF/UHF Radio Networks Applications and
Features Threats Countermeasures Communications Network Design and
Architecture Hardware Components and Functions Security and Key Management
Other Security Features 7. Electronic Protection Measures - Frequency
Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM)
Military Applications Network Architecture and Management Characteristics
of Frequency Hopping Networks Key/Data Management and Tools Hardware
components 8. Link and Bulk Encryption Basic Technology of Link Encryption
The Ciphering Process Cryptographic Parameters Key and Network Management
Military Link Security 9. Secure Fax Networks Basic Facsimile Technology
Manual/Automatic Key Selection Network Architecture Key Management and
Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks
Implementation of Solutions Access Protection Boot-up Protection by
On-Board Hardware with Smart Card LAN Security Model Application of PC
Security System Administration 11. Secure E-mail The E-mail Scenario
Threats Type and Motivation of Attackers Methods of Attack Countermeasures
Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario
Definition VPN Protocols Packet Header Formats Security Association List
Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures
Attacks within the Public Network 13. Military Data Communication
Applications Data Terminals and their Operating Features Technical
Parameters Security Management Key Management Combat Packet Data Networks
14. Managment, Support and Training Environments of Security Management
Infrastructure and Planning Operational Hierarchies Training Customer
Support Troubleshooting References Index
Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and
Solutions The Technical Threats to Communications Security Authentication
Confidentiality Integrity Availability Compromising Emanation/Tempest
Threats 2. An Introduction to Encryption and Security Management Analogue
Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management
Evaluating Encryption Equipment 3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated
Cipher Module 4. Telephone Security Specific Threats to Telephone
Operations Network Technologies Telephone Security Solutions Key and Access
Management Network Implementation Key Distribution Summary 5. Secure GSM
Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom
Security for GSM Users Key Management and Tools GRPS General Packet Radio
Systems 6. Security in Private VHF/UHF Radio Networks Applications and
Features Threats Countermeasures Communications Network Design and
Architecture Hardware Components and Functions Security and Key Management
Other Security Features 7. Electronic Protection Measures - Frequency
Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM)
Military Applications Network Architecture and Management Characteristics
of Frequency Hopping Networks Key/Data Management and Tools Hardware
components 8. Link and Bulk Encryption Basic Technology of Link Encryption
The Ciphering Process Cryptographic Parameters Key and Network Management
Military Link Security 9. Secure Fax Networks Basic Facsimile Technology
Manual/Automatic Key Selection Network Architecture Key Management and
Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks
Implementation of Solutions Access Protection Boot-up Protection by
On-Board Hardware with Smart Card LAN Security Model Application of PC
Security System Administration 11. Secure E-mail The E-mail Scenario
Threats Type and Motivation of Attackers Methods of Attack Countermeasures
Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario
Definition VPN Protocols Packet Header Formats Security Association List
Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures
Attacks within the Public Network 13. Military Data Communication
Applications Data Terminals and their Operating Features Technical
Parameters Security Management Key Management Combat Packet Data Networks
14. Managment, Support and Training Environments of Security Management
Infrastructure and Planning Operational Hierarchies Training Customer
Support Troubleshooting References Index
Solutions The Technical Threats to Communications Security Authentication
Confidentiality Integrity Availability Compromising Emanation/Tempest
Threats 2. An Introduction to Encryption and Security Management Analogue
Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management
Evaluating Encryption Equipment 3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated
Cipher Module 4. Telephone Security Specific Threats to Telephone
Operations Network Technologies Telephone Security Solutions Key and Access
Management Network Implementation Key Distribution Summary 5. Secure GSM
Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom
Security for GSM Users Key Management and Tools GRPS General Packet Radio
Systems 6. Security in Private VHF/UHF Radio Networks Applications and
Features Threats Countermeasures Communications Network Design and
Architecture Hardware Components and Functions Security and Key Management
Other Security Features 7. Electronic Protection Measures - Frequency
Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM)
Military Applications Network Architecture and Management Characteristics
of Frequency Hopping Networks Key/Data Management and Tools Hardware
components 8. Link and Bulk Encryption Basic Technology of Link Encryption
The Ciphering Process Cryptographic Parameters Key and Network Management
Military Link Security 9. Secure Fax Networks Basic Facsimile Technology
Manual/Automatic Key Selection Network Architecture Key Management and
Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks
Implementation of Solutions Access Protection Boot-up Protection by
On-Board Hardware with Smart Card LAN Security Model Application of PC
Security System Administration 11. Secure E-mail The E-mail Scenario
Threats Type and Motivation of Attackers Methods of Attack Countermeasures
Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario
Definition VPN Protocols Packet Header Formats Security Association List
Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures
Attacks within the Public Network 13. Military Data Communication
Applications Data Terminals and their Operating Features Technical
Parameters Security Management Key Management Combat Packet Data Networks
14. Managment, Support and Training Environments of Security Management
Infrastructure and Planning Operational Hierarchies Training Customer
Support Troubleshooting References Index