Buy Secure Communications by Roger J. Sutton - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > Secure Communications: Applications and Management(Wiley Series on Communications Networking & Distributed Systems)
Secure Communications: Applications and Management(Wiley Series on Communications Networking & Distributed Systems)

Secure Communications: Applications and Management(Wiley Series on Communications Networking & Distributed Systems)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

If you need to know more about communication's security management, this is the perfect book for you...

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.
* Explains the practical links between cryptography and telecommunications
* Addresses the pertinent issues of implementation of cryptography as a method of protecting information
* Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material
* Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection
* Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on...

Table of Contents:
Preface

Acknowledgement

Glossary

Acronyms and Abbreviations

1. Threats and Solutions

The Technical Threats to Communications Security

Authentication

Confidentiality

Integrity

Availability

Compromising Emanation/Tempest Threats

2. An Introduction to Encryption and Security Management

Analogue Scrambling

Algorithms

Goodbye DES, Hello DES

Fundamentals in Key Management

Evaluating Encryption Equipment

3. Voice Security in Military Applications

Analogue Encryption of Naval Long range, HF Radio Communications

Stand-alone Digital Cipher Units in Land-based Operations

Radio Integrated Cipher Module

4. Telephone Security

Specific Threats to Telephone Operations

Network Technologies

Telephone Security Solutions

Key and Access Management

Network Implementation

Key Distribution

Summary

5. Secure GSM Systems

The Basic GSM Architecture

Standard GSM Secuirty Features

Custom Security for GSM Users

Key Management and Tools

GRPS General Packet Radio Systems

6. Security in Private VHF/UHF Radio Networks

Applications and Features

Threats

Countermeasures

Communications Network Design and Architecture

Hardware Components and Functions

Security and Key Management

Other Security Features

7. Electronic Protection Measures -
Frequency Hopping

Electronic Warfare (EW)

Electronic Protection Measures (EPM)

Military Applications

Network Architecture and Management

Characteristics of Frequency Hopping Networks

Key/Data Management and Tools

Hardware components

8. Link and Bulk Encryption

Basic Technology of Link Encryption

The Ciphering Process

Cryptographic Parameters

Key and Network Management

Military Link Security

9. Secure Fax Networks

Basic Facsimile Technology

Manual/Automatic Key Selection

Network Architecture

Key Management and Tools

Fax Over Satellite Links

10. PC Security

Security Threats and Risks

Implementation of Solutions

Access Protection

Boot-up Protection by On-Board Hardware with Smart Card

LAN Security

Model Application of PC Security

System Administration

11. Secure E-mail

The E-mail Scenario

Threats

Type and Motivation of Attackers

Methods of Attack

Countermeasures

Guidelines for E-mail Security

12. Secure Virtual Private Networks

Scenario

Definition VPN

Protocols

Packet Header Formats

Security Association List

Tunnel Table

Routing Tables

Packet Filtering

Threats and Countermeasures

Attacks within the Public Network

13. Military Data Communication

Applications

Data Terminals and their Operating Features

Technical Parameters

Security Management

Key Management

Combat Packet Data Networks

14. Managment, Support and Training

Environments of Security Management

Infrastructure and Planning

Operational Hierarchies

Training

Customer Support

Troubleshooting

References

Index

About the Author :

Roger J. Sutton is the author of Secure Communications: Applications and Management, published by Wiley.



Review :
"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)


Best Sellers


Product Details
  • ISBN-13: 9780470852606
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • Series Title: Wiley Series on Communications Networking & Distributed Systems
  • ISBN-10: 0470852607
  • Publisher Date: 07 Jul 2003
  • Binding: Digital (delivered electronically)
  • No of Pages: 346
  • Sub Title: Applications and Management


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Secure Communications: Applications and Management(Wiley Series on Communications Networking & Distributed Systems)
John Wiley & Sons Inc -
Secure Communications: Applications and Management(Wiley Series on Communications Networking & Distributed Systems)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Secure Communications: Applications and Management(Wiley Series on Communications Networking & Distributed Systems)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!