Computer communications security principles, standard protocols and techniques

This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments -- with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II d...

Full description

Saved in:
Bibliographic Details
Main Author: Ford, Warwick (Author)
Format: Book
Published: Englewood Cliffs, N.J. PTR Prentice Hall 1994
©1994
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-099419
005 2022101510550
020 # # |a 0137994532  |q hardcover 
040 # # |a UiTM  |b eng  |c UiTM  |e rda 
090 0 0 |a QA76.9.A25  |b F65 1994 
100 1 # |a Ford, Warwick  |e author 
245 1 1 |a Computer communications security  |b principles, standard protocols and techniques  |c Warwick Ford 
264 # 1 |a Englewood Cliffs, N.J.  |b PTR Prentice Hall  |c 1994 
264 # 1 |c ©1994 
300 # # |a xxii, 494 pages  |b illustrations  |c 25 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references and index 
520 # # |a This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments -- with a focus on inter-system, as opposed to intra-system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. Covers such topics as cryptography, authentication, access control, and non-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking. For anyone required to design, develop, implement, market, or procure products based on specific network security standards. 
650 # 0 |a Telecommunication systems  |x Security measures 
650 # 0 |a Computer security 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=099419 
964 # # |c BOK  |d 01