In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the
Internet and Wireless Security
โ Scribed by R. Temple, R. Temple, J. Regnault
- Publisher
- Institution of Engineering and Technology
- Year
- 2002
- Tongue
- English
- Leaves
- 223
- Series
- Btexact Communications Technology Series, 4
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses.
Also available:
Mobile and Wireless Communications: Key Technologies and Future Applications - ISBN 0863413684 Voice Over IP (internet protocol): systems and solutions - ISBN 0852960247
The Institution of Engineering and Technology is one of the world's leading professional societies for the engineering and technology community. The IET publishes more than 100 new titles every year; a rich mix of books, journals and magazines with a back catalogue of more than 350 books in 18 different subject areas including:
-Power & Energy -Renewable Energy -Radar, Sonar & Navigation -Electromagnetics -Electrical Measurement -History of Technology -Technology Management
๐ SIMILAR VOLUMES
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Netw