gogogo
Syndetics cover image
Image from Syndetics

Internet and Intranet security Rolf Oppliger

By: Material type: TextTextSeries: Artech House computer science libraryPublication details: Boston London Artech House c1998Description: 348p. illISBN:
  • 0890068291
Subject(s): DDC classification:
  • 005.8 OPP
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 005.8 OPP (Browse shelf(Opens below)) 1 Available 39002000261553

Enhanced descriptions from Syndetics:

This guide to Internet and intranet security covers all of the relevant technologies with the aim of enhancing the reader's ability to create and deploy secure architectures. It seeks also to give the reader the knowledge and tools needed for improved productivity, whether in setting up commerce on-line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.

Includes index

Table of contents provided by Syndetics

  • Preface (p. xv)
  • References (p. xxi)
  • Acknowledgments (p. xxiii)
  • I Fundamentals (p. 1)
  • 1 Terminology (p. 3)
  • References (p. 10)
  • 2 TCP/IP Networking (p. 11)
  • 2.1 History and Development (p. 12)
  • 2.2 Internet (p. 15)
  • 2.3 Internet Standardization (p. 17)
  • 2.4 Internet Model (p. 35)
  • References (p. 52)
  • 3 Attacks (p. 55)
  • 3.1 Passive Attacks (p. 56)
  • 3.2 Active Attacks (p. 58)
  • References (p. 66)
  • 4 OSI Security Architecture (p. 69)
  • 4.1 Introduction (p. 69)
  • 4.2 Security Services (p. 72)
  • 4.3 Security Mechanisms (p. 75)
  • 4.4 Security Management (p. 78)
  • References (p. 79)
  • 5 Cryptographic Techniques (p. 81)
  • 5.1 Introduction (p. 81)
  • 5.2 Cryptographic Hash Functions (p. 84)
  • 5.3 Secret Key Cryptography (p. 87)
  • 5.4 Public Key Cryptography (p. 90)
  • 5.5 Digital Envelopes (p. 98)
  • 5.6 Protection of Cryptographic Keys (p. 101)
  • 5.7 Generation of Pseudorandom Bit Sequences (p. 102)
  • 5.8 Legal Issues (p. 103)
  • 5.9 Notation (p. 107)
  • References (p. 109)
  • 6 Authentication and Key Distribution (p. 111)
  • 6.1 Authentication (p. 111)
  • 6.2 Key Distribution (p. 119)
  • References (p. 122)
  • II Access Control (p. 125)
  • 7 Overview (p. 127)
  • 7.1 Introduction (p. 128)
  • 7.2 Basic Components (p. 133)
  • 7.3 Sources for Further Information (p. 139)
  • References (p. 140)
  • 8 Packet Filtering (p. 141)
  • 8.1 Introduction (p. 141)
  • 8.2 Packet-Filtering Rules (p. 145)
  • 8.3 Packet-Filtering Products (p. 151)
  • 8.4 Stateful Inspection (p. 156)
  • 8.5 Conclusions (p. 157)
  • References (p. 160)
  • 9 Circuit-Level Gateways (p. 161)
  • 9.1 Introduction (p. 161)
  • 9.2 SOCKS (p. 163)
  • 9.3 Conclusions (p. 168)
  • References (p. 169)
  • 10 Application-Level Gateways (p. 171)
  • 10.1 Introduction (p. 171)
  • 10.2 User Authentication and Authorization (p. 175)
  • 10.3 Proxy Servers (p. 177)
  • 10.4 Conclusions (p. 178)
  • References (p. 180)
  • 11 Firewall Configurations (p. 181)
  • 11.1 Dual-Homed Firewall Configurations (p. 181)
  • 11.2 Screened Host Firewall Configurations (p. 185)
  • 11.3 Screened Subnet Firewall Configurations (p. 186)
  • 11.4 Network Address Translation (p. 188)
  • 11.5 Protection Against Denial of Service (p. 190)
  • 11.6 Firewall Certification (p. 192)
  • References (p. 193)
  • 12 Conclusions and Outlook (p. 195)
  • References (p. 201)
  • III Communication Security (p. 203)
  • 13 Network Access Layer Security Protocols (p. 205)
  • 13.1 Introduction (p. 205)
  • 13.2 Layer 2 Forwarding Protocol (p. 209)
  • 13.3 Point-to-Point Tunneling Protocol (p. 210)
  • 13.4 Layer 2 Tunneling Protocol (p. 218)
  • 13.5 Conclusions (p. 219)
  • References (p. 220)
  • 14 Internet Layer Security Protocols (p. 223)
  • 14.1 Previous Work (p. 224)
  • 14.2 IETF Standardization (p. 226)
  • 14.3 IP Security Architecture (p. 227)
  • 14.4 IPsec Protocols (p. 230)
  • 14.5 Key Management Protocols (p. 236)
  • 14.6 Implementations (p. 245)
  • 14.7 Conclusions (p. 246)
  • References (p. 247)
  • 15 Transport Layer Security Protocols (p. 251)
  • 15.1 Previous Work (p. 251)
  • 15.2 SSL Protocol (p. 252)
  • 15.3 TLS Protocol (p. 269)
  • 15.4 Firewall Tunneling (p. 274)
  • 15.5 Conclusions (p. 277)
  • References (p. 279)
  • 16 Application Layer Security Protocols (p. 283)
  • 16.1 Security-Enhanced Application Protocols (p. 284)
  • 16.2 Authentication and Key Distribution Systems (p. 295)
  • 16.3 Conclusions (p. 307)
  • References (p. 308)
  • 17 Message Security Protocols (p. 313)
  • 17.1 Introduction (p. 313)
  • 17.2 Secure Messaging Protocols (p. 314)
  • 17.3 Conclusions (p. 325)
  • References (p. 326)
  • 18 Conclusions and Outlook (p. 329)
  • Reference (p. 333)
  • IV Discussion (p. 335)
  • 19 Public Key Infrastructures (p. 337)
  • 19.1 Introduction (p. 337)
  • 19.2 Public Key Certificates (p. 339)
  • 19.3 Attribute Certificates (p. 342)
  • 19.4 IETF PKIX WG (p. 345)
  • 19.5 Certificate Revocation (p. 348)
  • 19.6 Conclusions (p. 352)
  • References (p. 356)
  • 20 Electronic Commerce (p. 361)
  • References (p. 366)
  • 21 Risk Management (p. 369)
  • 21.1 Introduction (p. 369)
  • 21.2 Formal Risk Analysis (p. 371)
  • 21.3 Alternative Approaches and Technologies (p. 373)
  • 21.4 Conclusions (p. 375)
  • References (p. 376)
  • Epilogue (p. 379)
  • References (p. 381)
  • Abbreviations and Acronyms (p. 383)
  • About the Author (p. 393)
  • Index (p. 395)

Author notes provided by Syndetics

Rolf Oppliger received his M.Sc. and Ph.D. in Computer Science from the University of Berne, Switzerland, and the Venia Legendi in Computer Science from the University of Zürich, Switzerland.

Oppliger is the founder and owner of eSECURITY Technologies Rolf Oppliger (www.esecurity.ch) and works for the Swiss Federal Strategy Unit for Information Technology (FSUIT) . He is also the author of Security Technologies for the World Wide Web (Artech House, 1999) , Internet and Intranet Security (Artech House, 1998), and Authentication Systems for Secure Networks (Artech House, 1996). Dr. Oppliger is the computer security series editor at Artech House.

050

Powered by Koha