Flylib.com
Internet & Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Internet and Intranet Security, Second Edition
Preface
Acknowledgments
Part I: Fundamentals
Chapter 1: Terminology
REFERENCES
Chapter 2: TCPIP Networking
2.1 HISTORY AND DEVELOPMENT
2.2 INTERNET
2.3 INTERNET STANDARDIZATION
2.4 INTERNET MODEL
REFERENCES
Chapter 3: Attacks
3.1 PASSIVE ATTACKS
3.2 ACTIVE ATTACKS
REFERENCES
Chapter 4: OSI Security Architecture
4.2 SECURITY SERVICES
4.3 SECURITY MECHANISMS
4.4 SECURITY MANAGEMENT
REFERENCES
Chapter 5: Cryptographic Techniques
5.2 CRYPTOGRAPHIC HASH FUNCTIONS
5.3 SECRET KEY CRYPTOGRAPHY
5.4 PUBLIC KEY CRYPTOGRAPHY
5.5 DIGITAL ENVELOPES
5.6 PROTECTION OF CRYPTOGRAPHIC KEYS
5.7 GENERATION OF PSEUDORANDOM BIT SEQUENCES
5.8 LEGAL ISSUES
5.9 NOTATION
REFERENCES
Chapter 6: Authentication and Key Distribution
6.2 KEY DISTRIBUTION
REFERENCES
Part II: Access Control
Chapter 7: Overview
7.1 INTRODUCTION
7.2 BASIC COMPONENTS
7.3 SOURCES FOR FURTHER INFORMATION
REFERENCES
Chapter 8: Packet Filtering
8.2 PACKET-FILTERING RULES
8.3 PACKET-FILTERING PRODUCTS
8.4 STATEFUL INSPECTION
8.5 CONCLUSIONS
REFERENCES
Chapter 9: Circuit-Level Gateways
9.2 SOCKS
9.3 CONCLUSIONS
REFERENCES
Chapter 10: Application-Level Gateways
10.2 USER AUTHENTICATION AND AUTHORIZATION
10.3 PROXY SERVERS
10.4 CONCLUSIONS
REFERENCES
Chapter 11: Firewall Configurations
11.2 SCREENED HOST FIREWALL CONFIGURATIONS
11.3 SCREENED SUBNET FIREWALL CONFIGURATIONS
11.4 NETWORK ADDRESS TRANSLATION
11.5 PROTECTION AGAINST DENIAL OF SERVICE
11.6 FIREWALL CERTIFICATION
REFERENCES
Chapter 12: Conclusions and Outlook
REFERENCES
Part III: Communication Security
Chapter 13: Network Access Layer Security Protocols
13.2 LAYER 2 FORWARDING PROTOCOL
13.3 POINT-TO-POINT TUNNELING PROTOCOL
13.4 LAYER 2 TUNNELING PROTOCOL
13.5 CONCLUSIONS
REFERENCES
Chapter 14: Internet Layer Security Protocols
14.2 IETF STANDARDIZATION
14.3 IP SECURITY ARCHITECTURE
14.4 IPSEC PROTOCOLS
14.5 KEY MANAGEMENT PROTOCOLS
14.6 IMPLEMENTATIONS
14.7 CONCLUSIONS
REFERENCES
Chapter 15: Transport Layer Security Protocols
15.2 SSL PROTOCOL
15.3 TLS PROTOCOL
15.4 FIREWALL TUNNELING
15.5 CONCLUSIONS
REFERENCES
Chapter 16: Application Layer Security Protocols
16.1 SECURITY-ENHANCED APPLICATION PROTOCOLS
16.2 AUTHENTICATION AND KEY DISTRIBUTION SYSTEMS
16.3 CONCLUSIONS
REFERENCES
Chapter 17: Message Security Protocols
17.2 SECURE MESSAGING PROTOCOLS
17.3 CONCLUSIONS
REFERENCES
Chapter 18: Conclusions and Outlook
REFERENCE
Part IV: Discussion
Chapter 19: Public Key Infrastructures
19.2 PUBLIC KEY CERTIFICATES
19.3 ATTRIBUTE CERTIFICATES
19.4 IETF PKIX WG
19.5 CERTIFICATE REVOCATION
19.6 CONCLUSIONS
REFERENCES
Chapter 20: Electronic Commerce
REFERENCES
Chapter 21: Risk Management
21.2 FORMAL RISK ANALYSIS
21.3 ALTERNATIVE APPROACHES AND TECHNOLOGIES
21.4 CONCLUSIONS
REFERENCES
Epilogue
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Object Types, Predicates, and Basic Constraints
Mapping ORM Models to Logical Database Models
Reverse Engineering and Importing to ORM
Editing Logical Models”Intermediate Aspects
Agile Project Management: Creating Innovative Products (2nd Edition)
Employ Iterative, Feature-Based Delivery
Encourage Exploration
Practice: Product Feature List
Individual Performance
Practice: Daily Interaction with the Customer Team
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
CMS and S/MIME
SSL and TLS
Appendix C Using the Bouncy Castle API for Elliptic Curve
Java How to Program (6th Edition) (How to Program (Deitel))
Instance Variables, set Methods and get Methods
Wrap-Up
Type-Wrapper Classes for Primitive Types
Terminology
Introduction
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
How case studies are used
Part I: SOA and Web Services Fundamentals
Coordination
Security
Deriving business services
Junos Cookbook (Cookbooks (OReilly))
Getting Exclusive Access to Configure the Router
Router Interfaces
Sending Version 1 Update Messages
Moving IS-IS Traffic off a Router
Configuring OSPF for IPv6
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies