skip to content
Networking Security and Standards Preview this item
ClosePreview this item
Checking...

Networking Security and Standards

Author: Weidong Kou
Publisher: Boston, MA : Springer US, 1997.
Series: International series in engineering and computer science, 394.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The rapid development of the Internet, coupled with increasing security requirements in information networks, databases, systems, and other information resources has led to the development of this book. Networking Security and Standards responds to increasing security needs in the marketplace by providing a comprehensive explanation of the fundamental issues of networking security. The book presents concepts and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Weidong Kou
ISBN: 9781461561538 1461561531
OCLC Number: 851785733
Description: 1 online resource (xvi, 207 pages).
Contents: 1. Business Fundamentals of Security --
1.1 Principles of Security --
1.2 Identification and Authentication --
1.3 Access Control --
1.4 Confidentiality --
1.5 Data Integrity --
1.6 Non-Repudiation --
1.7 Security Management --
1.8 Security Regulation --
1.9 Security Standards --
2. Technical Fundamentals of Security --
2.1 Secret and Public Key Cryptography --
2.2 Secret Key Encryption --
2.3 Public Key Encryption --
2.4 Message Digest and Authentication --
2.5 Digital Signature --
2.6 Key Management --
2.7 Identity Authentication --
2.8 Key Escrow Encryption --
2.9 Cryptoanalysis --
3. Security Architecture Standard --
3.1 ISO 7498 Basic Reference Model for OSI --
3.2 ISO 7498-2 Security Architecture --
3.3 Security Services --
3.4 Security Mechanisms --
3.5 Relationship of Security Services, Mechanisms and Layers --
3.6 Placement of Security Services and Mechanisms --
3.7 Security Management --
4. Data Encryption Standards --
4.1 ANSI X3.92 Data Encryption Standard (DES) --
4.2 ANSI X3.106 DEA --
Modes of Operation --
4.3 ANSI X9.23 Standard --
5. Key Management Standards --
5.1 ANSI X9.17 Standard --
5.2 ANSI X9.24 Standard --
6. Data Integrity Standards --
6.1 ANSI X9.9 Standard --
6.2 ANSI X9.19 Standard --
6.3 NIST FIPS 180 Secure Hash Standard --
7. Digital Signature Standards --
7.1 NIST FIPS 186 Digital Signature Standard --
7.2 RSA Digital Signature (CCITT X.509, ANSI X9.31, and ISO 9796) --
8. Sign-On Authentication Standard --
8.1 ANSI X9.26 Sign-On Authentication --
8.2 ANSI X9.26 Interoperability --
9. Directory and Certificate Standards --
9.1 CCITT X.500 Standard --
9.2 CCITT X.509 Standard --
10. Electronic Mail Standards --
10.1 CCITT X.400 Message Handling Systems --
10.2 Security in CCITT X.400 --
10.3 Security in CCITT X.411 --
10.4 Security in CCITT X.420 --
11. Electronic Data Interchange Standards --
11.1 ANSI X12 EDI and ISO EDIFACT Standards --
11.2 Secure EDI (ANSI X12.58) --
11.3 Secure EDIFACT (ISO 9735) --
12. Security Application Technologies --
12.1 RSA Public Key Cryptography Standards --
12.2 DoD Security Classifications --
12.3 Kerberos and KryptoKnight --
12.4 Firewall --
12.5 Internet Secure Protocols: SSL and SHTTP --
12.6 Private Communication Technology Protocols --
12.7 Java Security --
12.8 Internet Keyed Payment Protocols --
12.9 Security Transaction Technology --
12.10 Secure Electronic Transaction --
12.11 Digital Cash and Digital Check --
12.12 Smart Cards --
12.13 Security for Lotus Notes --
12.14 Database Security.
Series Title: International series in engineering and computer science, 394.
Responsibility: by Weidong Kou.

Abstract:

Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/851785733> # Networking Security and Standards
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "851785733" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/608591#Place/boston_ma> ; # Boston, MA
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://dewey.info/class/004.6/e23/> ;
    schema:about <http://id.worldcat.org/fast/887978> ; # Data structures (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/608591#Topic/computer_science> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/608591#Topic/information_systems> ; # Information systems
    schema:about <http://experiment.worldcat.org/entity/work/data/608591#Topic/computer_communication_networks> ; # Computer communication networks
    schema:about <http://id.worldcat.org/fast/872078> ; # Computer engineering
    schema:about <http://experiment.worldcat.org/entity/work/data/608591#Topic/data_structures_computer_science> ; # Data structures (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/608591#Topic/computer_engineering> ; # Computer engineering
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/12485851> ; # Weidong Kou
    schema:datePublished "1997" ;
    schema:description "The rapid development of the Internet, coupled with increasing security requirements in information networks, databases, systems, and other information resources has led to the development of this book. Networking Security and Standards responds to increasing security needs in the marketplace by providing a comprehensive explanation of the fundamental issues of networking security. The book presents concepts and principles of security standards, and provides a description of some emerging security technologies. This book deals with the issues of common security problems and how they can be addressed, and discusses the most appropriate algorithms, standards, and technologies which can be applied to solving common security problems. Networking Security and Standards introduces readers to security at a conceptual level, with a strong emphasis on standards. It addresses the concepts and principles of security standards rather than the detailed implementation specifications. This book serves as an excellent reference for professionals working in all aspects of networking security and standards, and may be used as a text for advanced courses on the topic."@en ;
    schema:description "1. Business Fundamentals of Security -- 1.1 Principles of Security -- 1.2 Identification and Authentication -- 1.3 Access Control -- 1.4 Confidentiality -- 1.5 Data Integrity -- 1.6 Non-Repudiation -- 1.7 Security Management -- 1.8 Security Regulation -- 1.9 Security Standards -- 2. Technical Fundamentals of Security -- 2.1 Secret and Public Key Cryptography -- 2.2 Secret Key Encryption -- 2.3 Public Key Encryption -- 2.4 Message Digest and Authentication -- 2.5 Digital Signature -- 2.6 Key Management -- 2.7 Identity Authentication -- 2.8 Key Escrow Encryption -- 2.9 Cryptoanalysis -- 3. Security Architecture Standard -- 3.1 ISO 7498 Basic Reference Model for OSI -- 3.2 ISO 7498-2 Security Architecture -- 3.3 Security Services -- 3.4 Security Mechanisms -- 3.5 Relationship of Security Services, Mechanisms and Layers -- 3.6 Placement of Security Services and Mechanisms -- 3.7 Security Management -- 4. Data Encryption Standards -- 4.1 ANSI X3.92 Data Encryption Standard (DES) -- 4.2 ANSI X3.106 DEA -- Modes of Operation -- 4.3 ANSI X9.23 Standard -- 5. Key Management Standards -- 5.1 ANSI X9.17 Standard -- 5.2 ANSI X9.24 Standard -- 6. Data Integrity Standards -- 6.1 ANSI X9.9 Standard -- 6.2 ANSI X9.19 Standard -- 6.3 NIST FIPS 180 Secure Hash Standard -- 7. Digital Signature Standards -- 7.1 NIST FIPS 186 Digital Signature Standard -- 7.2 RSA Digital Signature (CCITT X.509, ANSI X9.31, and ISO 9796) -- 8. Sign-On Authentication Standard -- 8.1 ANSI X9.26 Sign-On Authentication -- 8.2 ANSI X9.26 Interoperability -- 9. Directory and Certificate Standards -- 9.1 CCITT X.500 Standard -- 9.2 CCITT X.509 Standard -- 10. Electronic Mail Standards -- 10.1 CCITT X.400 Message Handling Systems -- 10.2 Security in CCITT X.400 -- 10.3 Security in CCITT X.411 -- 10.4 Security in CCITT X.420 -- 11. Electronic Data Interchange Standards -- 11.1 ANSI X12 EDI and ISO EDIFACT Standards -- 11.2 Secure EDI (ANSI X12.58) -- 11.3 Secure EDIFACT (ISO 9735) -- 12. Security Application Technologies -- 12.1 RSA Public Key Cryptography Standards -- 12.2 DoD Security Classifications -- 12.3 Kerberos and KryptoKnight -- 12.4 Firewall -- 12.5 Internet Secure Protocols: SSL and SHTTP -- 12.6 Private Communication Technology Protocols -- 12.7 Java Security -- 12.8 Internet Keyed Payment Protocols -- 12.9 Security Transaction Technology -- 12.10 Secure Electronic Transaction -- 12.11 Digital Cash and Digital Check -- 12.12 Smart Cards -- 12.13 Security for Lotus Notes -- 12.14 Database Security."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/608591> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/608591#Series/international_series_in_engineering_and_computer_science> ; # International series in engineering and computer science ;
    schema:isPartOf <http://worldcat.org/issn/0893-3405> ; # The Springer International Series in Engineering and Computer Science,
    schema:isSimilarTo <http://worldcat.org/entity/work/data/608591#CreativeWork/> ;
    schema:name "Networking Security and Standards"@en ;
    schema:productID "851785733" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/851785733#PublicationEvent/boston_ma_springer_us_1997> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/608591#Agent/springer_us> ; # Springer US
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3080729> ;
    schema:url <http://dx.doi.org/10.1007/978-1-4615-6153-8> ;
    schema:workExample <http://worldcat.org/isbn/9781461561538> ;
    schema:workExample <http://dx.doi.org/10.1007/978-1-4615-6153-8> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/851785733> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/608591#Agent/springer_us> # Springer US
    a bgn:Agent ;
    schema:name "Springer US" ;
    .

<http://experiment.worldcat.org/entity/work/data/608591#Series/international_series_in_engineering_and_computer_science> # International series in engineering and computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/851785733> ; # Networking Security and Standards
    schema:name "International series in engineering and computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/608591#Topic/computer_communication_networks> # Computer communication networks
    a schema:Intangible ;
    schema:name "Computer communication networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/608591#Topic/computer_engineering> # Computer engineering
    a schema:Intangible ;
    schema:name "Computer engineering"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/608591#Topic/computer_science> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/608591#Topic/data_structures_computer_science> # Data structures (Computer science)
    a schema:Intangible ;
    schema:name "Data structures (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/608591#Topic/information_systems> # Information systems
    a schema:Intangible ;
    schema:name "Information systems"@en ;
    .

<http://id.worldcat.org/fast/872078> # Computer engineering
    a schema:Intangible ;
    schema:name "Computer engineering"@en ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/887978> # Data structures (Computer science)
    a schema:Intangible ;
    schema:name "Data structures (Computer science)"@en ;
    .

<http://viaf.org/viaf/12485851> # Weidong Kou
    a schema:Person ;
    schema:familyName "Kou" ;
    schema:givenName "Weidong" ;
    schema:name "Weidong Kou" ;
    .

<http://worldcat.org/isbn/9781461561538>
    a schema:ProductModel ;
    schema:isbn "1461561531" ;
    schema:isbn "9781461561538" ;
    .

<http://worldcat.org/issn/0893-3405> # The Springer International Series in Engineering and Computer Science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/851785733> ; # Networking Security and Standards
    schema:issn "0893-3405" ;
    schema:name "The Springer International Series in Engineering and Computer Science," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.