𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

✍ Scribed by Gunter Schafer(auth.)


Year
2004
Tongue
English
Leaves
380
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security. This book gives a firm introduction into the field covering the fundamentals of data security technology and explaining in-depth how they are applied in communication networks.

Approaches network security from the wireless as well as the computer networking side.

  • Concentrates on the core networking issues (first 4 layers up to the transport layer).
  • Helps the reader to understand the risks of a lack of security in a network & how to prevent it.
  • Brings security in networks up to date by covering wireless and mobile security issues.
  • Includes security issues around hot topics such as wireless LANs (e.g. 802.11), AAA (Authentication, authorization, and accounting), and Mobile IP.
  • Illustrates complicated security concepts with exercises and features an extensive glossary.

An essential reference tool for graduate students of computer science, electrical engineering and telecommunications who need to learn the basics of network security. Also, professionals working in data- & telecommunications will also benefit from the book as it gives a self-contained introduction to the basics of network security: network managers, engineers, IT managers.Content:
Chapter 1 Introduction (pages 1–15):
Chapter 2 Fundamentals of Cryptology (pages 17–29):
Chapter 3 Symmetric Cryptography (pages 31–52):
Chapter 4 Asymmetric Cryptography (pages 53–81):
Chapter 5 Cryptographic Check Values (pages 83–100):
Chapter 6 Random Number Generation (pages 101–110):
Chapter 7 Cryptographic Protocols (pages 111–145):
Chapter 8 Access Control (pages 147–155):
Chapter 9 Integration of Security Services into Communication Architectures (pages 157–170):
Chapter 10 Link Layer Security Protocols (pages 171–194):
Chapter 11 IPSec Security Architecture (pages 195–242):
Chapter 12 Transport Layer Security Protocols (pages 243–268):
Chapter 13 Internet Firewalls (pages 269–288):
Chapter 14 Security Aspects of Mobile Communication (pages 289–298):
Chapter 15 Security in Wireless Local Area Networks (pages 299–313):
Chapter 16 Security in Mobile Wide?Area Networks (pages 315–331):
Chapter 17 Security of Mobile Internet Communication (pages 333–355):


πŸ“œ SIMILAR VOLUMES


Security in Fixed and Wireless Networks:
✍ GΓΌnter SchΓ€fer πŸ“‚ Library πŸ“… 2004 πŸ› Wiley 🌐 English

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and w

Security in Fixed and Wireless Networks
✍ Guenter Schaefer, Michael Rossberg πŸ“‚ Library πŸ“… 2016 πŸ› Wiley 🌐 English

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be d

Security in Wireless Mesh Networks (Wire
✍ Yan Zhang, Jun Zheng, Honglin Hu πŸ“‚ Library πŸ“… 2008 🌐 English

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l

Security and Data Reliability in Coopera
✍ Hassan, Emad S πŸ“‚ Library πŸ“… 2018 πŸ› CRC Press 🌐 English

Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybri