This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments — with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. Covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking. For anyone required to design, develop, implement, market, or procure products based on specific network security standards.
"synopsis" may belong to another edition of this title.
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments — with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques.Covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.For anyone required to design, develop, implement, market, or procure products based on specific network security standards.
"About this title" may belong to another edition of this title.
Seller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_383599782
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0137994532I2N00
Seller: Ammareal, Morangis, France
Softcover. Condition: Bon. Ancien livre de bibliothèque. Traces d'usure sur la couverture. Edition 1994. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Signs of wear on the cover. Edition 1994. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # E-768-503
Seller: Richard Booth's Bookshop, Hereford, United Kingdom
HardBack. Condition: Good. No Jacket. 520 pages. 1st editon. Good clean condition, no jacket.This book identifies and explains all the modern standardized methods of achieving network security in both TCPIP and OSI environments 8212; with a focus on intersystem, as opposed to intrasystem, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques.Covers such topics as cryptography, authentication, access control, and nonrepudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.For anyone required to design, develop, implement, market, or procure products based on specific network security standards. Seller Inventory # 100133326
Quantity: 1 available
Seller: 100POCKETS, Berkeley, CA, U.S.A.
Hardcover. Condition: New. Firwt Edition, 2nd Printing. HARDBACK BRAND NEW COPY. Boards/Fine. DJ/None as Issued. Computer security standards. Reference/resource. Volume covers all in-place, standardized methods in both TCP/IP and OSI environments. 492 pgs, 17 chapters in 2 parts: Part I, TECHNICAL BACKGROUND: Chapt 2, (following Intro), Network Security Fundamentals; 3, Security in a Layered Protocol Architecture; 4, Cryptographic Techniques; 5, Authentication; 6, Access Control; 7, Confidentiality & Integrity; and 8, Non-repudiation. PART II, STANDARD PROTOCOLS & TECHNIQUES: 9, Security Architecture & Frameworks; 10, Standard Security Techniques; 11, Lower Layers Security Protocols; 12, Upper Layers Security Protocols; 13, Electronic Mail & EDI Security; 14, Directory Systems Security; 15, Network Management; 16, Security Evaluation Criteria; and. 17, Planning Considerations, followed by 3 appendices (Appendix A. The Standardization Process; B. ASN.1 Notation & Registration; and C, How to Obtain Standards Documents). Seller Inventory # 018379
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-121380
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEOCT25-60845
Seller: ALLBOOKS1, Direk, SA, Australia
Brand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address. Seller Inventory # SHAK60845
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 528 1st Edition. Seller Inventory # 262611680
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 528. Seller Inventory # 5269055
Quantity: 1 available