Stamatios V. Kartalopoulos
Security of Information and Communication Networks
Stamatios V. Kartalopoulos
Security of Information and Communication Networks
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Information and communications security is a hot topic in private industry as well as in government agencies. This book provides a complete conceptual treatment of securing information and transporting it over a secure network in a manner that does not require a strong mathematical background. It stresses why information security is important, what is being done about it, how it applies to networks, and an overview of its key issues. It is written for anyone who needs to understand these important topics at a conceptual rather than a technical level.
Andere Kunden interessierten sich auch für
- Ross Anderson (UK Cambridge University)Security Engineering and Tobias on Locks Two-Book Set128,99 €
- Jennifer MinellaWireless Security Architecture42,99 €
- Ted CoombsCloud Security for Dummies30,99 €
- Nick AleksBlack Hat Bash60,99 €
- Roger A. GrimesRansomware Protection Playbook25,99 €
- Vickie LiBug Bounty Bootcamp54,99 €
- Ultra-Reliable and Low-Latency Communications (Urllc) Theory and Practice124,99 €
-
-
-
Information and communications security is a hot topic in private industry as well as in government agencies. This book provides a complete conceptual treatment of securing information and transporting it over a secure network in a manner that does not require a strong mathematical background. It stresses why information security is important, what is being done about it, how it applies to networks, and an overview of its key issues. It is written for anyone who needs to understand these important topics at a conceptual rather than a technical level.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- IEEE Press Series on Informati
- Verlag: IEEE COMPUTER SOC PR / John Wiley & Sons
- Artikelnr. des Verlages: 14529025000
- Seitenzahl: 316
- Erscheinungstermin: März 2009
- Englisch
- Abmessung: 236mm x 168mm x 21mm
- Gewicht: 572g
- ISBN-13: 9780470290255
- ISBN-10: 0470290250
- Artikelnr.: 25627042
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- IEEE Press Series on Informati
- Verlag: IEEE COMPUTER SOC PR / John Wiley & Sons
- Artikelnr. des Verlages: 14529025000
- Seitenzahl: 316
- Erscheinungstermin: März 2009
- Englisch
- Abmessung: 236mm x 168mm x 21mm
- Gewicht: 572g
- ISBN-13: 9780470290255
- ISBN-10: 0470290250
- Artikelnr.: 25627042
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Stamatios V. Kartalopoulos, PhD, is the Williams Professor in Telecommunications Networking at the ECE/TCOM graduate program at the University of Oklahoma and conducts research activities in optical networking and network security. He is also principal consultant of PhotonExperts, a consultancy on advanced optical technology and optical communications systems and networks. Previously, he defined, led, and managed research and development teams at Bell Laboratories, where he was awarded the President's Award as well as several other awards for excellence. Dr. Kartalopoulos has published both books and research papers extensively, has been awarded nineteen patents, and has lectured at international forums. An IEEE Distinguished Lecturer, he is an IEEE Fellow and member of SPIE, Sigma XI, and Etta Kappa Nu.
Preface
Acknowledgments
About the Author
1. Introduction
1.1 A Historical Perspective of Information and Network Security
1.2 Modern Cryptography, Watermarking, Steganography, Escrow and Cryptanalysis
1.3 Network Security
1.4 Security Threatening Attacks and Actions
2. Mathematical Foundations
2.1 Introduction
2.2 Logarithms
2.3 Prime Numbers
2.4 Modulus Arithmetic
2.5 Greatest Common Divisor
2.6 Groups
2.7 Rings
2.8 Fields
2.9 The Fermat's Theorem
2.10 The Euler's Theorem
2.11 Exclusive-Or
2.12 Random Numbers
3. Ciphers and Algorithms
3.1 Symmetric/Asymmetric Ciphers
3.2 Symmetric Ciphers
3.3 Asymmetric Cipher Systems
3.4 Elliptic Curve Cryptosystems
3.5 The RSA Algorithm
3.6 Key Management
4. Cryptographic Key Distribution Systems
4.1 Key Distribution
4.2 Merkle's Puzzle Method
4.3 Shamir's Key Distribution Method
4.4 Diffi e-Hellman Key Exchange Distribution
4.5 Digital Signature Systems
4.6 The Trusted Third Party or Key Escrow Encryption System
5. Chaotic Cryptographic Systems
5.1 Fundamentals of Chaotic Processes
5.2 Application of Chaotic Systems to Communications
5.3 Application of Chaotic Systems to Cryptography
References
6. Communication Security Layer Classifi cations
6.1 A Synergistic Security Framework
6.2 Firewalls and Gateways
6.3 Security Cross-Portfolio
6.4 Attacks and Security in the Internet
6.5 TACACS, SNMP and UDP
7. Network Security: Wireless Systems
7.1 Wireless Networks
7.2 WLAN
7.3 Wi-Fi, WPA and WPA2
7.4 EAP, EAPOL and RADIUS
7.5 Wireless Mobile Access Networks
7.6 B3G/4G
7.7 WiMax
7.8 IP Multimedia Subsystems
7.9 Bluetooth
7.10 Wireless Personal Area Networks
7.12 Wireless Ad-Hoc Networks
References
8. Network Security: Wired Systems
8.1 Introduction
8.2 Wired Networks
8.3 Security Issues
8.4 Security Comparison Between PSDN and IP
References
9. Network Security: Optical Systems
9.1 Introduction
9.2 Layers of Network Security
9.3 Security of Optical Access Network
9.4 Cyber-Attack Detection Mechanisms
9.5 A WDM Method Applicable to Link Security
9.6 Free Space Optical Networks
References
10. Quantum Networks
10.1 Introduction
10.2 Quantum Mechanics Not-for-Dummies
10.3 Quantum Cryptography
11. Next Generation Optical Network Security
11.1 Introduction
11.2 Standardized Protocols for Cost-Effi cient Optical Networks
11.3 Security in the Next Generation SONET/SDH
References
12. Biometrics in Communication Networks
12.1 Introduction
12.2 Biometric Types
12.3 Biometrics and Cryptography
12.4 Local and Remote Authentication
12.5 Biometrics Remote Authentication
References
Acronyms
Index
Acknowledgments
About the Author
1. Introduction
1.1 A Historical Perspective of Information and Network Security
1.2 Modern Cryptography, Watermarking, Steganography, Escrow and Cryptanalysis
1.3 Network Security
1.4 Security Threatening Attacks and Actions
2. Mathematical Foundations
2.1 Introduction
2.2 Logarithms
2.3 Prime Numbers
2.4 Modulus Arithmetic
2.5 Greatest Common Divisor
2.6 Groups
2.7 Rings
2.8 Fields
2.9 The Fermat's Theorem
2.10 The Euler's Theorem
2.11 Exclusive-Or
2.12 Random Numbers
3. Ciphers and Algorithms
3.1 Symmetric/Asymmetric Ciphers
3.2 Symmetric Ciphers
3.3 Asymmetric Cipher Systems
3.4 Elliptic Curve Cryptosystems
3.5 The RSA Algorithm
3.6 Key Management
4. Cryptographic Key Distribution Systems
4.1 Key Distribution
4.2 Merkle's Puzzle Method
4.3 Shamir's Key Distribution Method
4.4 Diffi e-Hellman Key Exchange Distribution
4.5 Digital Signature Systems
4.6 The Trusted Third Party or Key Escrow Encryption System
5. Chaotic Cryptographic Systems
5.1 Fundamentals of Chaotic Processes
5.2 Application of Chaotic Systems to Communications
5.3 Application of Chaotic Systems to Cryptography
References
6. Communication Security Layer Classifi cations
6.1 A Synergistic Security Framework
6.2 Firewalls and Gateways
6.3 Security Cross-Portfolio
6.4 Attacks and Security in the Internet
6.5 TACACS, SNMP and UDP
7. Network Security: Wireless Systems
7.1 Wireless Networks
7.2 WLAN
7.3 Wi-Fi, WPA and WPA2
7.4 EAP, EAPOL and RADIUS
7.5 Wireless Mobile Access Networks
7.6 B3G/4G
7.7 WiMax
7.8 IP Multimedia Subsystems
7.9 Bluetooth
7.10 Wireless Personal Area Networks
7.12 Wireless Ad-Hoc Networks
References
8. Network Security: Wired Systems
8.1 Introduction
8.2 Wired Networks
8.3 Security Issues
8.4 Security Comparison Between PSDN and IP
References
9. Network Security: Optical Systems
9.1 Introduction
9.2 Layers of Network Security
9.3 Security of Optical Access Network
9.4 Cyber-Attack Detection Mechanisms
9.5 A WDM Method Applicable to Link Security
9.6 Free Space Optical Networks
References
10. Quantum Networks
10.1 Introduction
10.2 Quantum Mechanics Not-for-Dummies
10.3 Quantum Cryptography
11. Next Generation Optical Network Security
11.1 Introduction
11.2 Standardized Protocols for Cost-Effi cient Optical Networks
11.3 Security in the Next Generation SONET/SDH
References
12. Biometrics in Communication Networks
12.1 Introduction
12.2 Biometric Types
12.3 Biometrics and Cryptography
12.4 Local and Remote Authentication
12.5 Biometrics Remote Authentication
References
Acronyms
Index
Preface
Acknowledgments
About the Author
1. Introduction
1.1 A Historical Perspective of Information and Network Security
1.2 Modern Cryptography, Watermarking, Steganography, Escrow and Cryptanalysis
1.3 Network Security
1.4 Security Threatening Attacks and Actions
2. Mathematical Foundations
2.1 Introduction
2.2 Logarithms
2.3 Prime Numbers
2.4 Modulus Arithmetic
2.5 Greatest Common Divisor
2.6 Groups
2.7 Rings
2.8 Fields
2.9 The Fermat's Theorem
2.10 The Euler's Theorem
2.11 Exclusive-Or
2.12 Random Numbers
3. Ciphers and Algorithms
3.1 Symmetric/Asymmetric Ciphers
3.2 Symmetric Ciphers
3.3 Asymmetric Cipher Systems
3.4 Elliptic Curve Cryptosystems
3.5 The RSA Algorithm
3.6 Key Management
4. Cryptographic Key Distribution Systems
4.1 Key Distribution
4.2 Merkle's Puzzle Method
4.3 Shamir's Key Distribution Method
4.4 Diffi e-Hellman Key Exchange Distribution
4.5 Digital Signature Systems
4.6 The Trusted Third Party or Key Escrow Encryption System
5. Chaotic Cryptographic Systems
5.1 Fundamentals of Chaotic Processes
5.2 Application of Chaotic Systems to Communications
5.3 Application of Chaotic Systems to Cryptography
References
6. Communication Security Layer Classifi cations
6.1 A Synergistic Security Framework
6.2 Firewalls and Gateways
6.3 Security Cross-Portfolio
6.4 Attacks and Security in the Internet
6.5 TACACS, SNMP and UDP
7. Network Security: Wireless Systems
7.1 Wireless Networks
7.2 WLAN
7.3 Wi-Fi, WPA and WPA2
7.4 EAP, EAPOL and RADIUS
7.5 Wireless Mobile Access Networks
7.6 B3G/4G
7.7 WiMax
7.8 IP Multimedia Subsystems
7.9 Bluetooth
7.10 Wireless Personal Area Networks
7.12 Wireless Ad-Hoc Networks
References
8. Network Security: Wired Systems
8.1 Introduction
8.2 Wired Networks
8.3 Security Issues
8.4 Security Comparison Between PSDN and IP
References
9. Network Security: Optical Systems
9.1 Introduction
9.2 Layers of Network Security
9.3 Security of Optical Access Network
9.4 Cyber-Attack Detection Mechanisms
9.5 A WDM Method Applicable to Link Security
9.6 Free Space Optical Networks
References
10. Quantum Networks
10.1 Introduction
10.2 Quantum Mechanics Not-for-Dummies
10.3 Quantum Cryptography
11. Next Generation Optical Network Security
11.1 Introduction
11.2 Standardized Protocols for Cost-Effi cient Optical Networks
11.3 Security in the Next Generation SONET/SDH
References
12. Biometrics in Communication Networks
12.1 Introduction
12.2 Biometric Types
12.3 Biometrics and Cryptography
12.4 Local and Remote Authentication
12.5 Biometrics Remote Authentication
References
Acronyms
Index
Acknowledgments
About the Author
1. Introduction
1.1 A Historical Perspective of Information and Network Security
1.2 Modern Cryptography, Watermarking, Steganography, Escrow and Cryptanalysis
1.3 Network Security
1.4 Security Threatening Attacks and Actions
2. Mathematical Foundations
2.1 Introduction
2.2 Logarithms
2.3 Prime Numbers
2.4 Modulus Arithmetic
2.5 Greatest Common Divisor
2.6 Groups
2.7 Rings
2.8 Fields
2.9 The Fermat's Theorem
2.10 The Euler's Theorem
2.11 Exclusive-Or
2.12 Random Numbers
3. Ciphers and Algorithms
3.1 Symmetric/Asymmetric Ciphers
3.2 Symmetric Ciphers
3.3 Asymmetric Cipher Systems
3.4 Elliptic Curve Cryptosystems
3.5 The RSA Algorithm
3.6 Key Management
4. Cryptographic Key Distribution Systems
4.1 Key Distribution
4.2 Merkle's Puzzle Method
4.3 Shamir's Key Distribution Method
4.4 Diffi e-Hellman Key Exchange Distribution
4.5 Digital Signature Systems
4.6 The Trusted Third Party or Key Escrow Encryption System
5. Chaotic Cryptographic Systems
5.1 Fundamentals of Chaotic Processes
5.2 Application of Chaotic Systems to Communications
5.3 Application of Chaotic Systems to Cryptography
References
6. Communication Security Layer Classifi cations
6.1 A Synergistic Security Framework
6.2 Firewalls and Gateways
6.3 Security Cross-Portfolio
6.4 Attacks and Security in the Internet
6.5 TACACS, SNMP and UDP
7. Network Security: Wireless Systems
7.1 Wireless Networks
7.2 WLAN
7.3 Wi-Fi, WPA and WPA2
7.4 EAP, EAPOL and RADIUS
7.5 Wireless Mobile Access Networks
7.6 B3G/4G
7.7 WiMax
7.8 IP Multimedia Subsystems
7.9 Bluetooth
7.10 Wireless Personal Area Networks
7.12 Wireless Ad-Hoc Networks
References
8. Network Security: Wired Systems
8.1 Introduction
8.2 Wired Networks
8.3 Security Issues
8.4 Security Comparison Between PSDN and IP
References
9. Network Security: Optical Systems
9.1 Introduction
9.2 Layers of Network Security
9.3 Security of Optical Access Network
9.4 Cyber-Attack Detection Mechanisms
9.5 A WDM Method Applicable to Link Security
9.6 Free Space Optical Networks
References
10. Quantum Networks
10.1 Introduction
10.2 Quantum Mechanics Not-for-Dummies
10.3 Quantum Cryptography
11. Next Generation Optical Network Security
11.1 Introduction
11.2 Standardized Protocols for Cost-Effi cient Optical Networks
11.3 Security in the Next Generation SONET/SDH
References
12. Biometrics in Communication Networks
12.1 Introduction
12.2 Biometric Types
12.3 Biometrics and Cryptography
12.4 Local and Remote Authentication
12.5 Biometrics Remote Authentication
References
Acronyms
Index