Flylib.com
Internet & Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Internet and Intranet Security, Second Edition
Preface
Acknowledgments
Part I: Fundamentals
Chapter 1: Terminology
REFERENCES
Chapter 2: TCPIP Networking
2.1 HISTORY AND DEVELOPMENT
2.2 INTERNET
2.3 INTERNET STANDARDIZATION
2.4 INTERNET MODEL
REFERENCES
Chapter 3: Attacks
3.1 PASSIVE ATTACKS
3.2 ACTIVE ATTACKS
REFERENCES
Chapter 4: OSI Security Architecture
4.2 SECURITY SERVICES
4.3 SECURITY MECHANISMS
4.4 SECURITY MANAGEMENT
REFERENCES
Chapter 5: Cryptographic Techniques
5.2 CRYPTOGRAPHIC HASH FUNCTIONS
5.3 SECRET KEY CRYPTOGRAPHY
5.4 PUBLIC KEY CRYPTOGRAPHY
5.5 DIGITAL ENVELOPES
5.6 PROTECTION OF CRYPTOGRAPHIC KEYS
5.7 GENERATION OF PSEUDORANDOM BIT SEQUENCES
5.8 LEGAL ISSUES
5.9 NOTATION
REFERENCES
Chapter 6: Authentication and Key Distribution
6.2 KEY DISTRIBUTION
REFERENCES
Part II: Access Control
Chapter 7: Overview
7.1 INTRODUCTION
7.2 BASIC COMPONENTS
7.3 SOURCES FOR FURTHER INFORMATION
REFERENCES
Chapter 8: Packet Filtering
8.2 PACKET-FILTERING RULES
8.3 PACKET-FILTERING PRODUCTS
8.4 STATEFUL INSPECTION
8.5 CONCLUSIONS
REFERENCES
Chapter 9: Circuit-Level Gateways
9.2 SOCKS
9.3 CONCLUSIONS
REFERENCES
Chapter 10: Application-Level Gateways
10.2 USER AUTHENTICATION AND AUTHORIZATION
10.3 PROXY SERVERS
10.4 CONCLUSIONS
REFERENCES
Chapter 11: Firewall Configurations
11.2 SCREENED HOST FIREWALL CONFIGURATIONS
11.3 SCREENED SUBNET FIREWALL CONFIGURATIONS
11.4 NETWORK ADDRESS TRANSLATION
11.5 PROTECTION AGAINST DENIAL OF SERVICE
11.6 FIREWALL CERTIFICATION
REFERENCES
Chapter 12: Conclusions and Outlook
REFERENCES
Part III: Communication Security
Chapter 13: Network Access Layer Security Protocols
13.2 LAYER 2 FORWARDING PROTOCOL
13.3 POINT-TO-POINT TUNNELING PROTOCOL
13.4 LAYER 2 TUNNELING PROTOCOL
13.5 CONCLUSIONS
REFERENCES
Chapter 14: Internet Layer Security Protocols
14.2 IETF STANDARDIZATION
14.3 IP SECURITY ARCHITECTURE
14.4 IPSEC PROTOCOLS
14.5 KEY MANAGEMENT PROTOCOLS
14.6 IMPLEMENTATIONS
14.7 CONCLUSIONS
REFERENCES
Chapter 15: Transport Layer Security Protocols
15.2 SSL PROTOCOL
15.3 TLS PROTOCOL
15.4 FIREWALL TUNNELING
15.5 CONCLUSIONS
REFERENCES
Chapter 16: Application Layer Security Protocols
16.1 SECURITY-ENHANCED APPLICATION PROTOCOLS
16.2 AUTHENTICATION AND KEY DISTRIBUTION SYSTEMS
16.3 CONCLUSIONS
REFERENCES
Chapter 17: Message Security Protocols
17.2 SECURE MESSAGING PROTOCOLS
17.3 CONCLUSIONS
REFERENCES
Chapter 18: Conclusions and Outlook
REFERENCE
Part IV: Discussion
Chapter 19: Public Key Infrastructures
19.2 PUBLIC KEY CERTIFICATES
19.3 ATTRIBUTE CERTIFICATES
19.4 IETF PKIX WG
19.5 CERTIFICATE REVOCATION
19.6 CONCLUSIONS
REFERENCES
Chapter 20: Electronic Commerce
REFERENCES
Chapter 21: Risk Management
21.2 FORMAL RISK ANALYSIS
21.3 ALTERNATIVE APPROACHES AND TECHNOLOGIES
21.4 CONCLUSIONS
REFERENCES
Epilogue
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Encourage Exploration
Principles to Practices
Practice: Product Vision Box and Elevator Test Statement
Practice: Feature Cards
Reliable Innovation
Oracle Developer Forms Techniques
Obtaining Query Count Without EXECUTE-ing a Query
Sharing a Record Group Across Forms
Does Subclassing Exhibit Intelligence?
Summary
Summary
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
SWT Event Handling, Threading, and Displays
Layouts
Drag and Drop and the Clipboard
Printing
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Control Class Basics
Classic Controls
Modern Controls
Data Controls
Digital Character Animation 3 (No. 3)
Surface Types
Understanding Motion
Chapter Five. Creating Strong Poses
Acting and the Body
Other Techniques
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies