Flylib.com
Internet & Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Internet and Intranet Security, Second Edition
Preface
Acknowledgments
Part I: Fundamentals
Chapter 1: Terminology
REFERENCES
Chapter 2: TCPIP Networking
2.1 HISTORY AND DEVELOPMENT
2.2 INTERNET
2.3 INTERNET STANDARDIZATION
2.4 INTERNET MODEL
REFERENCES
Chapter 3: Attacks
3.1 PASSIVE ATTACKS
3.2 ACTIVE ATTACKS
REFERENCES
Chapter 4: OSI Security Architecture
4.2 SECURITY SERVICES
4.3 SECURITY MECHANISMS
4.4 SECURITY MANAGEMENT
REFERENCES
Chapter 5: Cryptographic Techniques
5.2 CRYPTOGRAPHIC HASH FUNCTIONS
5.3 SECRET KEY CRYPTOGRAPHY
5.4 PUBLIC KEY CRYPTOGRAPHY
5.5 DIGITAL ENVELOPES
5.6 PROTECTION OF CRYPTOGRAPHIC KEYS
5.7 GENERATION OF PSEUDORANDOM BIT SEQUENCES
5.8 LEGAL ISSUES
5.9 NOTATION
REFERENCES
Chapter 6: Authentication and Key Distribution
6.2 KEY DISTRIBUTION
REFERENCES
Part II: Access Control
Chapter 7: Overview
7.1 INTRODUCTION
7.2 BASIC COMPONENTS
7.3 SOURCES FOR FURTHER INFORMATION
REFERENCES
Chapter 8: Packet Filtering
8.2 PACKET-FILTERING RULES
8.3 PACKET-FILTERING PRODUCTS
8.4 STATEFUL INSPECTION
8.5 CONCLUSIONS
REFERENCES
Chapter 9: Circuit-Level Gateways
9.2 SOCKS
9.3 CONCLUSIONS
REFERENCES
Chapter 10: Application-Level Gateways
10.2 USER AUTHENTICATION AND AUTHORIZATION
10.3 PROXY SERVERS
10.4 CONCLUSIONS
REFERENCES
Chapter 11: Firewall Configurations
11.2 SCREENED HOST FIREWALL CONFIGURATIONS
11.3 SCREENED SUBNET FIREWALL CONFIGURATIONS
11.4 NETWORK ADDRESS TRANSLATION
11.5 PROTECTION AGAINST DENIAL OF SERVICE
11.6 FIREWALL CERTIFICATION
REFERENCES
Chapter 12: Conclusions and Outlook
REFERENCES
Part III: Communication Security
Chapter 13: Network Access Layer Security Protocols
13.2 LAYER 2 FORWARDING PROTOCOL
13.3 POINT-TO-POINT TUNNELING PROTOCOL
13.4 LAYER 2 TUNNELING PROTOCOL
13.5 CONCLUSIONS
REFERENCES
Chapter 14: Internet Layer Security Protocols
14.2 IETF STANDARDIZATION
14.3 IP SECURITY ARCHITECTURE
14.4 IPSEC PROTOCOLS
14.5 KEY MANAGEMENT PROTOCOLS
14.6 IMPLEMENTATIONS
14.7 CONCLUSIONS
REFERENCES
Chapter 15: Transport Layer Security Protocols
15.2 SSL PROTOCOL
15.3 TLS PROTOCOL
15.4 FIREWALL TUNNELING
15.5 CONCLUSIONS
REFERENCES
Chapter 16: Application Layer Security Protocols
16.1 SECURITY-ENHANCED APPLICATION PROTOCOLS
16.2 AUTHENTICATION AND KEY DISTRIBUTION SYSTEMS
16.3 CONCLUSIONS
REFERENCES
Chapter 17: Message Security Protocols
17.2 SECURE MESSAGING PROTOCOLS
17.3 CONCLUSIONS
REFERENCES
Chapter 18: Conclusions and Outlook
REFERENCE
Part IV: Discussion
Chapter 19: Public Key Infrastructures
19.2 PUBLIC KEY CERTIFICATES
19.3 ATTRIBUTE CERTIFICATES
19.4 IETF PKIX WG
19.5 CERTIFICATE REVOCATION
19.6 CONCLUSIONS
REFERENCES
Chapter 20: Electronic Commerce
REFERENCES
Chapter 21: Risk Management
21.2 FORMAL RISK ANALYSIS
21.3 ALTERNATIVE APPROACHES AND TECHNOLOGIES
21.4 CONCLUSIONS
REFERENCES
Epilogue
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Binding to the Directory
Controlling the Content of Search Results
Administrative Limits Governing Active Directory and ADAM
Summary
Error 0x80072035: The server is unwilling to process the request.
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
Conclusion
Appendix A Selected Detail From the PERIL Database
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
Basic SWT Widgets
Dialogs
Eclipse Forms
Sample Application
Visual C# 2005 How to Program (2nd Edition)
Self-Review Exercises
Simple HTTP Transactions
Terminology
J.6. Class DepositSlot
K.1. Introduction
InDesign Type: Professional Typography with Adobe InDesign CS2
When to Track
Paragraph Indents
Creating Decimal Tabs
Up Next
Nested Styles
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XV Customer Trust in Online Commerce
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies