Internet and Wireless Security
IET Digital Library
This title is available electronically through the IET Digital Library
Author: R. Temple and J. Regnault (Eds.)
Product Code: PBBT0040
Stock Status: In stock
£63.70 Member price
£98.00 Full price
Scope: Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.
This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses.
"A valuable contribution to the understanding of security from BTexact Technologies" Software World
IT professionals, telecommunications engineers, managers and researchers interested in security in communications.
Reference, professional, postgraduate.
Foreword, C. Earnshaw; 1: Introduction, J. Regnault and R. Temple; 2: Building on Rock Rather Than Sand-the Importance of Trusted Infrastructure for e-Business, M. Hogg and M, Smeaton; 3: XML and Security, A. Selkirk; 4: Using XML Security Mechanisms - A. Selkirk; 5: Security Modelling Language, M. Simms;
6: Next Generation Public Key Infrastructures, K. Bosworth and N. Tedeschi; 7: An overview of identifier-based public key cryptography, I. Levy; 8: Digital Archiving of High Value Data, T. Wright; 9: Wireless Security, C. Blanchard and N. Trask; 10: Wireless PKI, N. Trask and S. Jaweed;
11: TETRA Security, D. Parkinson; 12: "Firewalls-Evolve or Die", D. Gooch et al; 13: Concert VPDN, G. Shorrock; 14: Information Assurance, C. Colwill et al; 15: Biometrics, Marek Rejman-Greene; 16: Transforming the 'Weakest Link' : an HCI framework for usable and effective security, M. Sasse et al; 17: BS7799, M. Kenning; Glossary; Index.