PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Secure Communications

Applications and Management

Roger J. Sutton (Crypto AG, Switzerland)

$252.95

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
John Wiley & Sons Inc
27 December 2001
If you need to know more about communication's security management, this is the perfect book for you...

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
* Explains the practical links between cryptography and telecommunications
* Addresses the pertinent issues of implementation of cryptography as a method of protecting information
* Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
* Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
* Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions

Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...

By:  
Imprint:   John Wiley & Sons Inc
Country of Publication:   United States
Dimensions:   Height: 248mm,  Width: 172mm,  Spine: 25mm
Weight:   794g
ISBN:   9780471499046
ISBN 10:   0471499048
Series:   Wiley Series on Communications Networking & Distributed Systems
Pages:   346
Publication Date:  
Audience:   College/higher education ,  Professional and scholarly ,  General/trade ,  A / AS level ,  Further / Higher Education
Format:   Hardback
Publisher's Status:   Active
Preface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and Solutions The Technical Threats to Communications Security Authentication Confidentiality Integrity Availability Compromising Emanation/Tempest Threats 2. An Introduction to Encryption and Security Management Analogue Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management Evaluating Encryption Equipment 3. Voice Security in Military Applications Analogue Encryption of Naval Long range, HF Radio Communications Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated Cipher Module 4. Telephone Security Specific Threats to Telephone Operations Network Technologies Telephone Security Solutions Key and Access Management Network Implementation Key Distribution Summary 5. Secure GSM Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom Security for GSM Users Key Management and Tools GRPS General Packet Radio Systems 6. Security in Private VHF/UHF Radio Networks Applications and Features Threats Countermeasures Communications Network Design and Architecture Hardware Components and Functions Security and Key Management Other Security Features 7. Electronic Protection Measures - Frequency Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM) Military Applications Network Architecture and Management Characteristics of Frequency Hopping Networks Key/Data Management and Tools Hardware components 8. Link and Bulk Encryption Basic Technology of Link Encryption The Ciphering Process Cryptographic Parameters Key and Network Management Military Link Security 9. Secure Fax Networks Basic Facsimile Technology Manual/Automatic Key Selection Network Architecture Key Management and Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks Implementation of Solutions Access Protection Boot-up Protection by On-Board Hardware with Smart Card LAN Security Model Application of PC Security System Administration 11. Secure E-mail The E-mail Scenario Threats Type and Motivation of Attackers Methods of Attack Countermeasures Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario Definition VPN Protocols Packet Header Formats Security Association List Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures Attacks within the Public Network 13. Military Data Communication Applications Data Terminals and their Operating Features Technical Parameters Security Management Key Management Combat Packet Data Networks 14. Managment, Support and Training Environments of Security Management Infrastructure and Planning Operational Hierarchies Training Customer Support Troubleshooting References Index

Roger J. Sutton is the author of Secure Communications: Applications and Management, published by Wiley.

Reviews for Secure Communications: Applications and Management

...well--written and accessible... (Electronics Communication Engineering Journal, December 2002)


See Also