Flylib.com
Internet & Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Internet and Intranet Security, Second Edition
Preface
Acknowledgments
Part I: Fundamentals
Chapter 1: Terminology
REFERENCES
Chapter 2: TCPIP Networking
2.1 HISTORY AND DEVELOPMENT
2.2 INTERNET
2.3 INTERNET STANDARDIZATION
2.4 INTERNET MODEL
REFERENCES
Chapter 3: Attacks
3.1 PASSIVE ATTACKS
3.2 ACTIVE ATTACKS
REFERENCES
Chapter 4: OSI Security Architecture
4.2 SECURITY SERVICES
4.3 SECURITY MECHANISMS
4.4 SECURITY MANAGEMENT
REFERENCES
Chapter 5: Cryptographic Techniques
5.2 CRYPTOGRAPHIC HASH FUNCTIONS
5.3 SECRET KEY CRYPTOGRAPHY
5.4 PUBLIC KEY CRYPTOGRAPHY
5.5 DIGITAL ENVELOPES
5.6 PROTECTION OF CRYPTOGRAPHIC KEYS
5.7 GENERATION OF PSEUDORANDOM BIT SEQUENCES
5.8 LEGAL ISSUES
5.9 NOTATION
REFERENCES
Chapter 6: Authentication and Key Distribution
6.2 KEY DISTRIBUTION
REFERENCES
Part II: Access Control
Chapter 7: Overview
7.1 INTRODUCTION
7.2 BASIC COMPONENTS
7.3 SOURCES FOR FURTHER INFORMATION
REFERENCES
Chapter 8: Packet Filtering
8.2 PACKET-FILTERING RULES
8.3 PACKET-FILTERING PRODUCTS
8.4 STATEFUL INSPECTION
8.5 CONCLUSIONS
REFERENCES
Chapter 9: Circuit-Level Gateways
9.2 SOCKS
9.3 CONCLUSIONS
REFERENCES
Chapter 10: Application-Level Gateways
10.2 USER AUTHENTICATION AND AUTHORIZATION
10.3 PROXY SERVERS
10.4 CONCLUSIONS
REFERENCES
Chapter 11: Firewall Configurations
11.2 SCREENED HOST FIREWALL CONFIGURATIONS
11.3 SCREENED SUBNET FIREWALL CONFIGURATIONS
11.4 NETWORK ADDRESS TRANSLATION
11.5 PROTECTION AGAINST DENIAL OF SERVICE
11.6 FIREWALL CERTIFICATION
REFERENCES
Chapter 12: Conclusions and Outlook
REFERENCES
Part III: Communication Security
Chapter 13: Network Access Layer Security Protocols
13.2 LAYER 2 FORWARDING PROTOCOL
13.3 POINT-TO-POINT TUNNELING PROTOCOL
13.4 LAYER 2 TUNNELING PROTOCOL
13.5 CONCLUSIONS
REFERENCES
Chapter 14: Internet Layer Security Protocols
14.2 IETF STANDARDIZATION
14.3 IP SECURITY ARCHITECTURE
14.4 IPSEC PROTOCOLS
14.5 KEY MANAGEMENT PROTOCOLS
14.6 IMPLEMENTATIONS
14.7 CONCLUSIONS
REFERENCES
Chapter 15: Transport Layer Security Protocols
15.2 SSL PROTOCOL
15.3 TLS PROTOCOL
15.4 FIREWALL TUNNELING
15.5 CONCLUSIONS
REFERENCES
Chapter 16: Application Layer Security Protocols
16.1 SECURITY-ENHANCED APPLICATION PROTOCOLS
16.2 AUTHENTICATION AND KEY DISTRIBUTION SYSTEMS
16.3 CONCLUSIONS
REFERENCES
Chapter 17: Message Security Protocols
17.2 SECURE MESSAGING PROTOCOLS
17.3 CONCLUSIONS
REFERENCES
Chapter 18: Conclusions and Outlook
REFERENCE
Part IV: Discussion
Chapter 19: Public Key Infrastructures
19.2 PUBLIC KEY CERTIFICATES
19.3 ATTRIBUTE CERTIFICATES
19.4 IETF PKIX WG
19.5 CERTIFICATE REVOCATION
19.6 CONCLUSIONS
REFERENCES
Chapter 20: Electronic Commerce
REFERENCES
Chapter 21: Risk Management
21.2 FORMAL RISK ANALYSIS
21.3 ALTERNATIVE APPROACHES AND TECHNOLOGIES
21.4 CONCLUSIONS
REFERENCES
Epilogue
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Assessment Test
IT Project Management Overview
Other Planning Processes
Comprehensive Project Plan
Project Closure
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Understanding Form Technologies
Creating Forms
Setting Form Template and Digital Signing Options
Navigating the InfoPath Object Model
Writing Advanced Event Handlers
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring ROI in E-Commerce Applications: Analysis to Action
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 310 Conductors for General Wiring
Article 336 Power and Control Tray Cable Type TC
Article 396 Messenger Supported Wiring
Article 645 Information Technology Equipment
Example No. D8 Motor Circuit Conductors, Overload Protection, and Short-Circuit and Ground-Fault Protection
PMP Practice Questions Exam Cram 2
Project Initiation
Answers and Explanations
Project Closing
Answers and Explanations
Appendix A. CD Contents and Installation Instructions
Sap Bw: a Step By Step Guide for Bw 2.0
Creating InfoObjects Characteristics
Summary
Loading Data into the ODS Object
Creating an R/3 Source System
Section B.2. Dispatcher, Work Processes, and Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies