Panier
Livraison gratuite
Nous sommes Neutres au Carbone

Internet and Wireless Security Robert Temple

Internet and Wireless Security par Robert Temple

Internet and Wireless Security Robert Temple


€7.70
État - Très bon état
Disponible en seulement 1 exemplaire(s)

Résumé

Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses.

Internet and Wireless Security Résumé

Internet and Wireless Security Robert Temple

Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.

Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.

This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.

Internet and Wireless Security Avis

'A valuable contribution to the understanding of security from BTexact Technologies'

* Software World *

À propos de Robert Temple

Robert Temple is the chief security architect for BTexact Technologies. He is responsible for business development of BTexact's core security competence and for reviewing and assessing new security technologies. He has worked for BT for 16 years in the systems development field, concentrating on IT security and, most recently, on commercial deployment of PKI. Prior to his current role, Temple was head of group security policy and also head of the IT security unit. He is a member of the Steering Group of the European Electronic Signature Standardisation Initiative, the BCS, the Information Security Committee and the Association for Computing Machinery. John Regnault is head of security solutions for BTexact Technologies. He has worked for BT for 30 years, specialising in research and development on a wide range of communications technologies, and has published 35 technical papers. During the past eight years Regnault has developed and expanded the scope of BT's security research team. His team of 25 security specialists is now responsible for consulting on new security issues resulting from advances in technology across the BT group. This team covers a wide range of application areas including encryption, PKIs and secure network communications.

Sommaire

  • Chapter 1: Building on Rock Rather Than Sand
  • Chapter 2: XML and Security
  • Chapter 3: Using XML Security Mechanisms
  • Chapter 4: Security Modelling Language
  • Chapter 5: Public Key Infrastructures - the Next Generation
  • Chapter 6: An Overview of Identifier-Based Public Key Cryptography
  • Chapter 7: Secure Digital Archiving of High-Value Data
  • Chapter 8: Wireless Security
  • Chapter 9: Adapting Public Key Infrastructures to the Mobile Environment
  • Chapter 10: TETRA Security
  • Chapter 11: Firewalls - Evolve or Die
  • Chapter 12: The Ignite Managed Firewall and VPN Service
  • Chapter 13: Information Assurance
  • Chapter 14: Biometrics - Real Identities for a Virtual World
  • Chapter 15: Transforming the 'Weakest Link' - a Human-Computer
  • Chapter 16: Security Management Standard - ISO 17799/BS7799

Informations supplémentaires

GOR005117346
9780852961971
0852961979
Internet and Wireless Security Robert Temple
Occasion - Très bon état
Relié
Institution of Engineering and Technology
20020415
302
N/A
La photo du livre est présentée à titre d'illustration uniquement. La reliure, la couverture ou l'édition réelle peuvent varier.
Il s'agit d'un livre d'occasion - par conséquent, il a été lu par quelqu'un d'autre et il présente des signes d'usure et d'utilisation antérieure. Dans l'ensemble, nous nous attendons à ce qu'il soit en très bon état, mais si vous n'êtes pas entièrement satisfait, veuillez prendre contact avec nous.