Bücher über Kryptologie, die Algorithmen und Verschlüsselungstechniken beschreiben, gibt es in Hülle und Fülle. Aber es gibt nur wenige Bücher, die sich - wie "Secure Communications" - mit der praktischen Seite der sicheren Sprachübertragung beschäftigen. Autor Roger Sutton diskutiert hier verschiedene Kommunikationsmedien, wobei er insbesondere auf technische Fragen und Sicherheitsrisiken eingeht und verschiedene Möglichkeiten zur Problemlösung aufgezeigt. Zahlreiche durchgearbeitete Beispiele für Netzwerke runden den Text ab.
Bücher über Kryptologie, die Algorithmen und Verschlüsselungstechniken beschreiben, gibt es in Hülle und Fülle. Aber es gibt nur wenige Bücher, die sich - wie "Secure Communications" - mit der praktischen Seite der sicheren Sprachübertragung beschäftigen. Autor Roger Sutton diskutiert hier verschiedene Kommunikationsmedien, wobei er insbesondere auf technische Fragen und Sicherheitsrisiken eingeht und verschiedene Möglichkeiten zur Problemlösung aufgezeigt. Zahlreiche durchgearbeitete Beispiele für Netzwerke runden den Text ab.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Roger J. Sutton is the author of Secure Communications: Applications and Management, published by Wiley.
Inhaltsangabe
Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and Solutions The Technical Threats to Communications Security Authentication Confidentiality Integrity Availability Compromising Emanation/Tempest Threats 2. An Introduction to Encryption and Security Management Analogue Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management Evaluating Encryption Equipment 3. Voice Security in Military Applications Analogue Encryption of Naval Long range, HF Radio Communications Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated Cipher Module 4. Telephone Security Specific Threats to Telephone Operations Network Technologies Telephone Security Solutions Key and Access Management Network Implementation Key Distribution Summary 5. Secure GSM Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom Security for GSM Users Key Management and Tools GRPS General Packet Radio Systems 6. Security in Private VHF/UHF Radio Networks Applications and Features Threats Countermeasures Communications Network Design and Architecture Hardware Components and Functions Security and Key Management Other Security Features 7. Electronic Protection Measures - Frequency Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM) Military Applications Network Architecture and Management Characteristics of Frequency Hopping Networks Key/Data Management and Tools Hardware components 8. Link and Bulk Encryption Basic Technology of Link Encryption The Ciphering Process Cryptographic Parameters Key and Network Management Military Link Security 9. Secure Fax Networks Basic Facsimile Technology Manual/Automatic Key Selection Network Architecture Key Management and Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks Implementation of Solutions Access Protection Boot-up Protection by On-Board Hardware with Smart Card LAN Security Model Application of PC Security System Administration 11. Secure E-mail The E-mail Scenario Threats Type and Motivation of Attackers Methods of Attack Countermeasures Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario Definition VPN Protocols Packet Header Formats Security Association List Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures Attacks within the Public Network 13. Military Data Communication Applications Data Terminals and their Operating Features Technical Parameters Security Management Key Management Combat Packet Data Networks 14. Managment, Support and Training Environments of Security Management Infrastructure and Planning Operational Hierarchies Training Customer Support Troubleshooting References Index
Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and Solutions The Technical Threats to Communications Security Authentication Confidentiality Integrity Availability Compromising Emanation/Tempest Threats 2. An Introduction to Encryption and Security Management Analogue Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management Evaluating Encryption Equipment 3. Voice Security in Military Applications Analogue Encryption of Naval Long range, HF Radio Communications Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated Cipher Module 4. Telephone Security Specific Threats to Telephone Operations Network Technologies Telephone Security Solutions Key and Access Management Network Implementation Key Distribution Summary 5. Secure GSM Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom Security for GSM Users Key Management and Tools GRPS General Packet Radio Systems 6. Security in Private VHF/UHF Radio Networks Applications and Features Threats Countermeasures Communications Network Design and Architecture Hardware Components and Functions Security and Key Management Other Security Features 7. Electronic Protection Measures - Frequency Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM) Military Applications Network Architecture and Management Characteristics of Frequency Hopping Networks Key/Data Management and Tools Hardware components 8. Link and Bulk Encryption Basic Technology of Link Encryption The Ciphering Process Cryptographic Parameters Key and Network Management Military Link Security 9. Secure Fax Networks Basic Facsimile Technology Manual/Automatic Key Selection Network Architecture Key Management and Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks Implementation of Solutions Access Protection Boot-up Protection by On-Board Hardware with Smart Card LAN Security Model Application of PC Security System Administration 11. Secure E-mail The E-mail Scenario Threats Type and Motivation of Attackers Methods of Attack Countermeasures Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario Definition VPN Protocols Packet Header Formats Security Association List Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures Attacks within the Public Network 13. Military Data Communication Applications Data Terminals and their Operating Features Technical Parameters Security Management Key Management Combat Packet Data Networks 14. Managment, Support and Training Environments of Security Management Infrastructure and Planning Operational Hierarchies Training Customer Support Troubleshooting References Index
Rezensionen
"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826