+612 9045 4394
 
CHECKOUT
Internet and Intranet Security : Artech House Computer Security Series - Rolf Oppliger

Internet and Intranet Security

Artech House Computer Security Series

Hardcover

Published: 31st October 2001
Ships: 7 to 10 business days
7 to 10 business days
RRP $322.99
$223.75
31%
OFF
or 4 easy payments of $55.94 with Learn more

This extensively revised, new edition of the 1998 Artech House classic, "Internet and Intranet Security", offers professionals an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall technologies to help practitioners provide access control service, and discusses the cryptographic protocols used to provide today's communication security services. From TCP/IP networking and cryptographic fundamentals, to firewall technologies, communication security protocols, and public key infrastructures, this handy reference offers practical guidance in utilizing cutting-edge technologies to secure various applications in the field of e-commerce and e-business. The book explores the rationale behind the security technologies that have been proposed and deployed on the Internet, and shows how to implement security mechanisms and corresponding protocol specifications.

Prefacep. xv
Referencesp. xxi
Acknowledgmentsp. xxiii
Fundamentalsp. 1
Terminologyp. 3
Referencesp. 10
TCP/IP Networkingp. 11
History and Developmentp. 12
Internetp. 15
Internet Standardizationp. 17
Internet Modelp. 35
Referencesp. 52
Attacksp. 55
Passive Attacksp. 56
Active Attacksp. 58
Referencesp. 66
OSI Security Architecturep. 69
Introductionp. 69
Security Servicesp. 72
Security Mechanismsp. 75
Security Managementp. 78
Referencesp. 79
Cryptographic Techniquesp. 81
Introductionp. 81
Cryptographic Hash Functionsp. 84
Secret Key Cryptographyp. 87
Public Key Cryptographyp. 90
Digital Envelopesp. 98
Protection of Cryptographic Keysp. 101
Generation of Pseudorandom Bit Sequencesp. 102
Legal Issuesp. 103
Notationp. 107
Referencesp. 109
Authentication and Key Distributionp. 111
Authenticationp. 111
Key Distributionp. 119
Referencesp. 122
Access Controlp. 125
Overviewp. 127
Introductionp. 128
Basic Componentsp. 133
Sources for Further Informationp. 139
Referencesp. 140
Packet Filteringp. 141
Introductionp. 141
Packet-Filtering Rulesp. 145
Packet-Filtering Productsp. 151
Stateful Inspectionp. 156
Conclusionsp. 157
Referencesp. 160
Circuit-Level Gatewaysp. 161
Introductionp. 161
SOCKSp. 163
Conclusionsp. 168
Referencesp. 169
Application-Level Gatewaysp. 171
Introductionp. 171
User Authentication and Authorizationp. 175
Proxy Serversp. 177
Conclusionsp. 178
Referencesp. 180
Firewall Configurationsp. 181
Dual-Homed Firewall Configurationsp. 181
Screened Host Firewall Configurationsp. 185
Screened Subnet Firewall Configurationsp. 186
Network Address Translationp. 188
Protection Against Denial of Servicep. 190
Firewall Certificationp. 192
Referencesp. 193
Conclusions and Outlookp. 195
Referencesp. 201
Communication Securityp. 203
Network Access Layer Security Protocolsp. 205
Introductionp. 205
Layer 2 Forwarding Protocolp. 209
Point-to-Point Tunneling Protocolp. 210
Layer 2 Tunneling Protocolp. 218
Conclusionsp. 219
Referencesp. 220
Internet Layer Security Protocolsp. 223
Previous Workp. 224
IETF Standardizationp. 226
IP Security Architecturep. 227
IPsec Protocolsp. 230
Key Management Protocolsp. 236
Implementationsp. 245
Conclusionsp. 246
Referencesp. 247
Transport Layer Security Protocolsp. 251
Previous Workp. 251
SSL Protocolp. 252
TLS Protocolp. 269
Firewall Tunnelingp. 274
Conclusionsp. 277
Referencesp. 279
Application Layer Security Protocolsp. 283
Security-Enhanced Application Protocolsp. 284
Authentication and Key Distribution Systemsp. 295
Conclusionsp. 307
Referencesp. 308
Message Security Protocolsp. 313
Introductionp. 313
Secure Messaging Protocolsp. 314
Conclusionsp. 325
Referencesp. 326
Conclusions and Outlookp. 329
Referencep. 333
Discussionp. 335
Public Key Infrastructuresp. 337
Introductionp. 337
Public Key Certificatesp. 339
Attribute Certificatesp. 342
IETF PKIX WGp. 345
Certificate Revocationp. 348
Conclusionsp. 352
Referencesp. 356
Electronic Commercep. 361
Referencesp. 366
Risk Managementp. 369
Introductionp. 369
Formal Risk Analysisp. 371
Alternative Approaches and Technologiesp. 373
Conclusionsp. 375
Referencesp. 376
Epiloguep. 379
Referencesp. 381
Abbreviations and Acronymsp. 383
About the Authorp. 393
Indexp. 395
Table of Contents provided by Syndetics. All Rights Reserved.

ISBN: 9781580531665
ISBN-10: 1580531660
Series: Artech House Computer Security Series
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 432
Published: 31st October 2001
Publisher: Artech House Publishers
Country of Publication: US
Dimensions (cm): 23.4 x 15.6  x 2.3
Weight (kg): 0.78
Edition Number: 2
Edition Type: Revised