With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and w
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
β Scribed by Gunter Schafer(auth.)
- Year
- 2004
- Tongue
- English
- Leaves
- 380
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security. This book gives a firm introduction into the field covering the fundamentals of data security technology and explaining in-depth how they are applied in communication networks.
Approaches network security from the wireless as well as the computer networking side.
- Concentrates on the core networking issues (first 4 layers up to the transport layer).
- Helps the reader to understand the risks of a lack of security in a network & how to prevent it.
- Brings security in networks up to date by covering wireless and mobile security issues.
- Includes security issues around hot topics such as wireless LANs (e.g. 802.11), AAA (Authentication, authorization, and accounting), and Mobile IP.
- Illustrates complicated security concepts with exercises and features an extensive glossary.
An essential reference tool for graduate students of computer science, electrical engineering and telecommunications who need to learn the basics of network security. Also, professionals working in data- & telecommunications will also benefit from the book as it gives a self-contained introduction to the basics of network security: network managers, engineers, IT managers.Content:
Chapter 1 Introduction (pages 1β15):
Chapter 2 Fundamentals of Cryptology (pages 17β29):
Chapter 3 Symmetric Cryptography (pages 31β52):
Chapter 4 Asymmetric Cryptography (pages 53β81):
Chapter 5 Cryptographic Check Values (pages 83β100):
Chapter 6 Random Number Generation (pages 101β110):
Chapter 7 Cryptographic Protocols (pages 111β145):
Chapter 8 Access Control (pages 147β155):
Chapter 9 Integration of Security Services into Communication Architectures (pages 157β170):
Chapter 10 Link Layer Security Protocols (pages 171β194):
Chapter 11 IPSec Security Architecture (pages 195β242):
Chapter 12 Transport Layer Security Protocols (pages 243β268):
Chapter 13 Internet Firewalls (pages 269β288):
Chapter 14 Security Aspects of Mobile Communication (pages 289β298):
Chapter 15 Security in Wireless Local Area Networks (pages 299β313):
Chapter 16 Security in Mobile Wide?Area Networks (pages 315β331):
Chapter 17 Security of Mobile Internet Communication (pages 333β355):
π SIMILAR VOLUMES
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be d
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybri