Secure Communications - Applications And Management
商品資訊
ISBN13:9780471499046
出版社:John Wiley & Sons Inc
作者:Sutton
出版日:2001/12/27
裝訂/頁數:平裝/346頁
定價
:NT$ 7560 元優惠價
:
90 折 6804 元
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
商品簡介
名人/編輯推薦
目次
商品簡介
If you need to know more about communication's security management, this is the perfect book for you...
Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
* Explains the practical links between cryptography and telecommunications
* Addresses the pertinent issues of implementation of cryptography as a method of protecting information
* Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
* Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
* Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...
Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
* Explains the practical links between cryptography and telecommunications
* Addresses the pertinent issues of implementation of cryptography as a method of protecting information
* Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
* Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
* Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...
名人/編輯推薦
"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)
目次
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
The Technical Threats to Communications Security
Authentication
Confidentiality
Integrity
Availability
Compromising Emanation/Tempest Threats
2. An Introduction to Encryption and Security Management
Analogue Scrambling
Algorithms
Goodbye DES, Hello DES
Fundamentals in Key Management
Evaluating Encryption Equipment
3. Voice Security in Military Applications
Analogue Encryption of Naval Long range, HF Radio Communications
Stand-alone Digital Cipher Units in Land-based Operations
Radio Integrated Cipher Module
4. Telephone Security
Specific Threats to Telephone Operations
Network Technologies
Telephone Security Solutions
Key and Access Management
Network Implementation
Key Distribution
Summary
5. Secure GSM Systems
The Basic GSM Architecture
Standard GSM Secuirty Features
Custom Security for GSM Users
Key Management and Tools
GRPS General Packet Radio Systems
6. Security in Private VHF/UHF Radio Networks
Applications and Features
Threats
Countermeasures
Communications Network Design and Architecture
Hardware Components and Functions
Security and Key Management
Other Security Features
7. Electronic Protection Measures -
Frequency Hopping
Electronic Warfare (EW)
Electronic Protection Measures (EPM)
Military Applications
Network Architecture and Management
Characteristics of Frequency Hopping Networks
Key/Data Management and Tools
Hardware components
8. Link and Bulk Encryption
Basic Technology of Link Encryption
The Ciphering Process
Cryptographic Parameters
Key and Network Management
Military Link Security
9. Secure Fax Networks
Basic Facsimile Technology
Manual/Automatic Key Selection
Network Architecture
Key Management and Tools
Fax Over Satellite Links
10. PC Security
Security Threats and Risks
Implementation of Solutions
Access Protection
Boot-up Protection by On-Board Hardware with Smart Card
LAN Security
Model Application of PC Security
System Administration
11. Secure E-mail
The E-mail Scenario
Threats
Type and Motivation of Attackers
Methods of Attack
Countermeasures
Guidelines for E-mail Security
12. Secure Virtual Private Networks
Scenario
Definition VPN
Protocols
Packet Header Formats
Security Association List
Tunnel Table
Routing Tables
Packet Filtering
Threats and Countermeasures
Attacks within the Public Network
13. Military Data Communication
Applications
Data Terminals and their Operating Features
Technical Parameters
Security Management
Key Management
Combat Packet Data Networks
14. Managment, Support and Training
Environments of Security Management
Infrastructure and Planning
Operational Hierarchies
Training
Customer Support
Troubleshooting
References
Index
主題書展
更多
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

