Ulteriori informazioni
This book covers all the standardized methods of retrieving network security in both TCP1IP & OSF environments. Part 1 is a tutorial introduction to computer network security; Part 2 describes security standards, protocols, and techniques.
Sommario
I. TECHNICAL BACKGROUND.
2. Network Security Fundamentals.
3. Security in a Layered Protocol Architecture.
4. Cryptographic Techniques.
5. Authentication.
6. Access Control.
7. Confidentiality and Integrity.
8. Non-repudiation.
II. STANDARD PROTOCOLS AND TECHNIQUES.
9. Security Architecture and Frameworks.
10. Standard Security Techniques.
11. Lower Layers Security Protocols.
12. Upper Layers Security Protocols.
13. Electronic Mail and EDI Security.
14. Directory Systems Security.
15. Network Management.
16. Security Evaluation Criteria.
17. Planning Considerations.
Appendix A. The Standardization Process.
Appendix B. ASN.1 Notation and Registration.
Appendix C. How to Obtain Standards Documents.
Index.
Riassunto
This book covers all the standardized methods of retrieving network security in both TCP1IP & OSF environments. Part 1 is a tutorial introduction to computer network security; Part 2 describes security standards, protocols, and techniques.