Secure Communications: Applications and Management
Roger J. Sutton
- 出版商: Wiley
- 出版日期: 2002-02-15
- 售價: $874
- 語言: 英文
- 頁數: 346
- 裝訂: Hardcover
- ISBN: 0471499048
- ISBN-13: 9780471499046
下單後立即進貨 (約5~7天)
買這商品的人也買了...
-
$1,200$1,176 -
$970Introduction to Algorithms, 2/e
-
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$590$466 -
$560$504 -
$750$593 -
$780$616 -
$680$537 -
$580$452 -
$990$782 -
$480$408 -
$650$514 -
$550$468 -
$500$425 -
$420$328 -
$2,350$2,233 -
$720$569 -
$420$357 -
$620$489 -
$600$480 -
$380$323 -
$1,180$1,003 -
$620$527 -
$680$578 -
$720$569
相關主題
商品描述
Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
- Explains the practical links between cryptography and telecommunications
- Addresses the pertinent issues of implementation of cryptography as a method of protecting information
- Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
- Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
- Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on??
Table of Contents
Preface
Acknowledgement
Glossary
Acronyms and Abbreviations
1. Threats and Solutions
2. An Introduction to Encryption and Security Management
3. Voice Security in Military Applications
4. Telephone Security
5. Secure GSM Systems
6. Security in Private VHF/UHF Radio Networks
7. Electronic Protection Measures - Frequency Hopping
8. Link and Bulk Encryption
9. Secure Fax Networks
10. PC Security
11. Secure E-mail
12. Secure Virtual Private Networks
13. Military Data Communication
14. Managment, Support and Training