Security of Information and Communication Networks
Home > Computing and Information Technology > Computer security > Data encryption > Security of Information and Communication Networks: (IEEE Press Series on Information and Communication Networks Security)
10%
Security of Information and Communication Networks: (IEEE Press Series on Information and Communication Networks Security)

Security of Information and Communication Networks: (IEEE Press Series on Information and Communication Networks Security)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

2009 CHOICE AWARD OUTSTANDING ACADEMIC TITLE Information and communications security is a hot topic in private industry as well as in government agencies. This book provides a complete conceptual treatment of securing information and transporting it over a secure network in a manner that does not require a strong mathematical background. It stresses why information security is important, what is being done about it, how it applies to networks, and an overview of its key issues. It is written for anyone who needs to understand these important topics at a conceptual rather than a technical level.

Table of Contents:
Preface. Acknowledgments. About the Author. 1. Introduction. 1.1 A Historical Perspective of Information and Network Security. 1.2 Modern Cryptography, Watermarking, Steganography, Escrow and Cryptanalysis. 1.3 Network Security. 1.4 Security Threatening Attacks and Actions. 2. Mathematical Foundations. 2.1 Introduction. 2.2 Logarithms. 2.3 Prime Numbers. 2.4 Modulus Arithmetic. 2.5 Greatest Common Divisor. 2.6 Groups. 2.7 Rings. 2.8 Fields. 2.9 The Fermat's Theorem. 2.10 The Euler's Theorem. 2.11 Exclusive-Or. 2.12 Random Numbers. 3. Ciphers and Algorithms. 3.1 Symmetric/Asymmetric Ciphers. 3.2 Symmetric Ciphers. 3.3 Asymmetric Cipher Systems. 3.4 Elliptic Curve Cryptosystems. 3.5 The RSA Algorithm. 3.6 Key Management. 4. Cryptographic Key Distribution Systems. 4.1 Key Distribution. 4.2 Merkle's Puzzle Method. 4.3 Shamir's Key Distribution Method. 4.4 Diffi e-Hellman Key Exchange Distribution. 4.5 Digital Signature Systems. 4.6 The Trusted Third Party or Key Escrow Encryption System. 5. Chaotic Cryptographic Systems. 5.1 Fundamentals of Chaotic Processes. 5.2 Application of Chaotic Systems to Communications. 5.3 Application of Chaotic Systems to Cryptography. References. 6. Communication Security Layer Classifi cations. 6.1 A Synergistic Security Framework. 6.2 Firewalls and Gateways. 6.3 Security Cross-Portfolio. 6.4 Attacks and Security in the Internet. 6.5 TACACS, SNMP and UDP. 7. Network Security: Wireless Systems. 7.1 Wireless Networks. 7.2 WLAN. 7.3 Wi-Fi, WPA and WPA2. 7.4 EAP, EAPOL and RADIUS. 7.5 Wireless Mobile Access Networks. 7.6 B3G/4G. 7.7 WiMax. 7.8 IP Multimedia Subsystems. 7.9 Bluetooth. 7.10 Wireless Personal Area Networks. 7.12 Wireless Ad-Hoc Networks. References. 8. Network Security: Wired Systems. 8.1 Introduction. 8.2 Wired Networks. 8.3 Security Issues. 8.4 Security Comparison Between PSDN and IP. References. 9. Network Security: Optical Systems. 9.1 Introduction. 9.2 Layers of Network Security. 9.3 Security of Optical Access Network. 9.4 Cyber-Attack Detection Mechanisms. 9.5 A WDM Method Applicable to Link Security. 9.6 Free Space Optical Networks. References. 10. Quantum Networks. 10.1 Introduction. 10.2 Quantum Mechanics Not-for-Dummies. 10.3 Quantum Cryptography. 11. Next Generation Optical Network Security. 11.1 Introduction. 11.2 Standardized Protocols for Cost-Effi cient Optical Networks. 11.3 Security in the Next Generation SONET/SDH. References. 12. Biometrics in Communication Networks. 12.1 Introduction. 12.2 Biometric Types. 12.3 Biometrics and Cryptography. 12.4 Local and Remote Authentication. 12.5 Biometrics Remote Authentication. References. Acronyms. Index.

About the Author :
Stamatios V. Kartalopoulos, PhD, is the Williams Professor in Telecommunications Networking at the ECE/TCOM graduate program at the University of Oklahoma and conducts research activities in optical networking and network security. He is also principal consultant of PhotonExperts, a consultancy on advanced optical technology and optical communications systems and networks. Previously, he defined, led, and managed research and development teams at Bell Laboratories, where he was awarded the President's Award as well as several other awards for excellence. Dr. Kartalopoulos has published both books and research papers extensively, has been awarded nineteen patents, and has lectured at international forums. An IEEE Distinguished Lecturer, he is an IEEE Fellow and member of SPIE, Sigma XI, and Etta Kappa Nu.

Review :
“Finding a comprehensive and readable book in security is still rare. This work by Kartalopoulos (Univ. of Oklahoma) is one of these diamonds in the rough." (CHOICE, April 2010)


Best Sellers


Product Details
  • ISBN-13: 9780470290255
  • Publisher: John Wiley and Sons Ltd
  • Publisher Imprint: Wiley-Blackwell
  • Height: 242 mm
  • No of Pages: 352
  • Spine Width: 20 mm
  • Width: 159 mm
  • ISBN-10: 0470290250
  • Publisher Date: 03 Apr 2009
  • Binding: Hardback
  • Language: English
  • Series Title: IEEE Press Series on Information and Communication Networks Security
  • Weight: 580 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security of Information and Communication Networks: (IEEE Press Series on Information and Communication Networks Security)
John Wiley and Sons Ltd -
Security of Information and Communication Networks: (IEEE Press Series on Information and Communication Networks Security)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security of Information and Communication Networks: (IEEE Press Series on Information and Communication Networks Security)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!