Internet and Wireless Security -

Internet and Wireless Security

Robert Temple, John Regnault (Herausgeber)

Buch | Hardcover
302 Seiten
2002
Institution of Engineering and Technology (Verlag)
978-0-85296-197-1 (ISBN)
147,70 inkl. MwSt
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses.
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.


Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.


This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.

Robert Temple is the chief security architect for BTexact Technologies. He is responsible for business development of BTexact's core security competence and for reviewing and assessing new security technologies. He has worked for BT for 16 years in the systems development field, concentrating on IT security and, most recently, on commercial deployment of PKI. Prior to his current role, Temple was head of group security policy and also head of the IT security unit. He is a member of the Steering Group of the European Electronic Signature Standardisation Initiative, the BCS, the Information Security Committee and the Association for Computing Machinery. John Regnault is head of security solutions for BTexact Technologies. He has worked for BT for 30 years, specialising in research and development on a wide range of communications technologies, and has published 35 technical papers. During the past eight years Regnault has developed and expanded the scope of BT's security research team. His team of 25 security specialists is now responsible for consulting on new security issues resulting from advances in technology across the BT group. This team covers a wide range of application areas including encryption, PKIs and secure network communications.

Chapter 1: Building on Rock Rather Than Sand
Chapter 2: XML and Security
Chapter 3: Using XML Security Mechanisms
Chapter 4: Security Modelling Language
Chapter 5: Public Key Infrastructures - the Next Generation
Chapter 6: An Overview of Identifier-Based Public Key Cryptography
Chapter 7: Secure Digital Archiving of High-Value Data
Chapter 8: Wireless Security
Chapter 9: Adapting Public Key Infrastructures to the Mobile Environment
Chapter 10: TETRA Security
Chapter 11: Firewalls - Evolve or Die
Chapter 12: The Ignite Managed Firewall and VPN Service
Chapter 13: Information Assurance
Chapter 14: Biometrics - Real Identities for a Virtual World
Chapter 15: Transforming the 'Weakest Link' - a Human-Computer
Chapter 16: Security Management Standard - ISO 17799/BS7799

Erscheint lt. Verlag 15.4.2002
Reihe/Serie Telecommunications
Verlagsort Stevenage
Sprache englisch
Maße 156 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Technik Nachrichtentechnik
ISBN-10 0-85296-197-9 / 0852961979
ISBN-13 978-0-85296-197-1 / 9780852961971
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95