- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bücher über Kryptologie, die Algorithmen und Verschlüsselungstechniken beschreiben, gibt es in Hülle und Fülle. Aber es gibt nur wenige Bücher, die sich - wie "Secure Communications" - mit der praktischen Seite der sicheren Sprachübertragung beschäftigen. Autor Roger Sutton diskutiert hier verschiedene Kommunikationsmedien, wobei er insbesondere auf technische Fragen und Sicherheitsrisiken eingeht und verschiedene Möglichkeiten zur Problemlösung aufgezeigt. Zahlreiche durchgearbeitete Beispiele für Netzwerke runden den Text ab.
Andere Kunden interessierten sich auch für
- Nong YeSecure Computer and Network Systems160,99 €
- Andrei GurtovHost Identity Protocol (Hip)121,99 €
- Silke HoltmannsCellular Authentication for Mobile and Internet Services112,99 €
- Frank StajanoSecurity for Ubiquitous Computing136,99 €
- Yang XiaoSecurity in Distributed, Grid, Mobile, and Pervasive Computing120,99 €
- Matthias Chr. WoelfelDistant Speech Recognition147,99 €
- Abhijit BelapurkarDistributed Systems Security116,99 €
-
-
-
Bücher über Kryptologie, die Algorithmen und Verschlüsselungstechniken beschreiben, gibt es in Hülle und Fülle. Aber es gibt nur wenige Bücher, die sich - wie "Secure Communications" - mit der praktischen Seite der sicheren Sprachübertragung beschäftigen. Autor Roger Sutton diskutiert hier verschiedene Kommunikationsmedien, wobei er insbesondere auf technische Fragen und Sicherheitsrisiken eingeht und verschiedene Möglichkeiten zur Problemlösung aufgezeigt. Zahlreiche durchgearbeitete Beispiele für Netzwerke runden den Text ab.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Wiley Series in Communications Technology
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 346
- Erscheinungstermin: 15. Februar 2002
- Englisch
- Abmessung: 251mm x 170mm x 25mm
- Gewicht: 728g
- ISBN-13: 9780471499046
- ISBN-10: 0471499048
- Artikelnr.: 10073530
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Wiley Series in Communications Technology
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 346
- Erscheinungstermin: 15. Februar 2002
- Englisch
- Abmessung: 251mm x 170mm x 25mm
- Gewicht: 728g
- ISBN-13: 9780471499046
- ISBN-10: 0471499048
- Artikelnr.: 10073530
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Roger J. Sutton is the author of Secure Communications: Applications and Management, published by Wiley.
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index