Computer communications security principles, standard protocols and techniques
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments -- with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II d...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Englewood Cliffs, N.J.
PTR Prentice Hall
1994
©1994 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-099419 | ||
005 | 2022101510550 | ||
020 | # | # | |a 0137994532 |q hardcover |
040 | # | # | |a UiTM |b eng |c UiTM |e rda |
090 | 0 | 0 | |a QA76.9.A25 |b F65 1994 |
100 | 1 | # | |a Ford, Warwick |e author |
245 | 1 | 1 | |a Computer communications security |b principles, standard protocols and techniques |c Warwick Ford |
264 | # | 1 | |a Englewood Cliffs, N.J. |b PTR Prentice Hall |c 1994 |
264 | # | 1 | |c ©1994 |
300 | # | # | |a xxii, 494 pages |b illustrations |c 25 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments -- with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. Covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking. For anyone required to design, develop, implement, market, or procure products based on specific network security standards. |
650 | # | 0 | |a Telecommunication systems |x Security measures |
650 | # | 0 | |a Computer security |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=099419 |
964 | # | # | |c BOK |d 01 |