
Résumé
* Discusses various communication mediums, highlighting their technical aspects, their security risks and suggests solutions to the problems facing the security systems designer, buyer or manager
* Provides numerous worked, network models, based on real life projects, which present a variety of practical solutions and suggestions, which the security planners may either adopt directly, or adapt according to their own particular needs and circumstances
* Reinforces the need for secure communications, including reference to historical events and the author's personal experience
* Equips the secure communications buyer or designer, with fundamental tools to assist with the assessment of ciphering equipment and to facilitate decision-making processes
* Highlights the need for efficient network management, including the setting up of a management hierarchy, formulating a security strategy, its tactical and operational implementation and the paramount task of training personnel
* Investigates the threats to voice and fax communications and suggests solutions with particular attention to telephone, GSM and radio technologies
* Enables the reader to identify suitable equipment, its practical application and the management tools required to secure communicationlinks
* Provides comprehensive foundation material on basic encryption and communications security, for the uninformed reader to be able to appreciate the technical aspects and security implications that are discussed later in the book.
A valuable reference resource for engineers, designers and developers of telecommunications and communications security systems, as well as security researchers, communications systems and networks managers and security personnel, and postgraduate and senior undergraduate students on security/cryptology courses.
Contents
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
2. An Introduction to Encryption and Security
Management
3. Voice Security in Military Applications
4. Telephone Security
5. Secure GSM Systems
6. Security in Private VHF/UHF Radio Networks
7. Electronic Protection Measures - Frequency Hopping
8. Link and Bulk Encryption
9. Secure Fax Networks
10. PC Security
11. Secure E-mail
12. Secure Virtual Private Networks
13. Military Data Communication
14. Management, Support and Training
References
Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Roger J. Sutton |
Parution | 09/01/2002 |
Nb. de pages | 322 |
Format | 17 x 25 |
Couverture | Broché |
Poids | 732g |
Intérieur | Noir et Blanc |
EAN13 | 9780471499046 |
ISBN13 | 978-0-471-49904-6 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet