Security of E-Systems and Computer Networks
Cambridge University Press, Jun 14, 2007 - Computers - 357 pages
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Public key cryptosystems
Authentication and digital signature
Esystem and network security tools
Biometricbased security systems
Trust management in communication networks 19
access control actions activity alerts algorithm allows applications architecture assessment attacks authentication authorization biometric certificate client communication components confidentiality cryptographic cryptosystems decryption defined delegation developed devices digital credentials digital signature distribution e-commerce e-government e-service ebXML electronic encryption end-entity enterprise entity execution firewall header identify IEEE implement infected infrastructure integrity Internet intrusion detection systems IPSec issuer issues L2TP malicious malware mechanisms merchant mobile monitoring node one-way function operation packet party password payment performed private key protection protocol public key public key infrastructure random number registry request requirements risk analysis scanning scenario scheme secret key security policy server solutions specific target techniques threats traffic transaction Trojan trust management tunnel types typically valid verify virtual private networks virus viruses vulnerabilities wireless WLANs worm