Flylib.com
Internet & Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Table of Contents
BackCover
Internet and Intranet Security, Second Edition
Preface
Acknowledgments
Part I: Fundamentals
Chapter 1: Terminology
REFERENCES
Chapter 2: TCPIP Networking
2.1 HISTORY AND DEVELOPMENT
2.2 INTERNET
2.3 INTERNET STANDARDIZATION
2.4 INTERNET MODEL
REFERENCES
Chapter 3: Attacks
3.1 PASSIVE ATTACKS
3.2 ACTIVE ATTACKS
REFERENCES
Chapter 4: OSI Security Architecture
4.2 SECURITY SERVICES
4.3 SECURITY MECHANISMS
4.4 SECURITY MANAGEMENT
REFERENCES
Chapter 5: Cryptographic Techniques
5.2 CRYPTOGRAPHIC HASH FUNCTIONS
5.3 SECRET KEY CRYPTOGRAPHY
5.4 PUBLIC KEY CRYPTOGRAPHY
5.5 DIGITAL ENVELOPES
5.6 PROTECTION OF CRYPTOGRAPHIC KEYS
5.7 GENERATION OF PSEUDORANDOM BIT SEQUENCES
5.8 LEGAL ISSUES
5.9 NOTATION
REFERENCES
Chapter 6: Authentication and Key Distribution
6.2 KEY DISTRIBUTION
REFERENCES
Part II: Access Control
Chapter 7: Overview
7.1 INTRODUCTION
7.2 BASIC COMPONENTS
7.3 SOURCES FOR FURTHER INFORMATION
REFERENCES
Chapter 8: Packet Filtering
8.2 PACKET-FILTERING RULES
8.3 PACKET-FILTERING PRODUCTS
8.4 STATEFUL INSPECTION
8.5 CONCLUSIONS
REFERENCES
Chapter 9: Circuit-Level Gateways
9.2 SOCKS
9.3 CONCLUSIONS
REFERENCES
Chapter 10: Application-Level Gateways
10.2 USER AUTHENTICATION AND AUTHORIZATION
10.3 PROXY SERVERS
10.4 CONCLUSIONS
REFERENCES
Chapter 11: Firewall Configurations
11.2 SCREENED HOST FIREWALL CONFIGURATIONS
11.3 SCREENED SUBNET FIREWALL CONFIGURATIONS
11.4 NETWORK ADDRESS TRANSLATION
11.5 PROTECTION AGAINST DENIAL OF SERVICE
11.6 FIREWALL CERTIFICATION
REFERENCES
Chapter 12: Conclusions and Outlook
REFERENCES
Part III: Communication Security
Chapter 13: Network Access Layer Security Protocols
13.2 LAYER 2 FORWARDING PROTOCOL
13.3 POINT-TO-POINT TUNNELING PROTOCOL
13.4 LAYER 2 TUNNELING PROTOCOL
13.5 CONCLUSIONS
REFERENCES
Chapter 14: Internet Layer Security Protocols
14.2 IETF STANDARDIZATION
14.3 IP SECURITY ARCHITECTURE
14.4 IPSEC PROTOCOLS
14.5 KEY MANAGEMENT PROTOCOLS
14.6 IMPLEMENTATIONS
14.7 CONCLUSIONS
REFERENCES
Chapter 15: Transport Layer Security Protocols
15.2 SSL PROTOCOL
15.3 TLS PROTOCOL
15.4 FIREWALL TUNNELING
15.5 CONCLUSIONS
REFERENCES
Chapter 16: Application Layer Security Protocols
16.1 SECURITY-ENHANCED APPLICATION PROTOCOLS
16.2 AUTHENTICATION AND KEY DISTRIBUTION SYSTEMS
16.3 CONCLUSIONS
REFERENCES
Chapter 17: Message Security Protocols
17.2 SECURE MESSAGING PROTOCOLS
17.3 CONCLUSIONS
REFERENCES
Chapter 18: Conclusions and Outlook
REFERENCE
Part IV: Discussion
Chapter 19: Public Key Infrastructures
19.2 PUBLIC KEY CERTIFICATES
19.3 ATTRIBUTE CERTIFICATES
19.4 IETF PKIX WG
19.5 CERTIFICATE REVOCATION
19.6 CONCLUSIONS
REFERENCES
Chapter 20: Electronic Commerce
REFERENCES
Chapter 21: Risk Management
21.2 FORMAL RISK ANALYSIS
21.3 ALTERNATIVE APPROACHES AND TECHNOLOGIES
21.4 CONCLUSIONS
REFERENCES
Epilogue
Abbreviations and Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Rolf Oppliger
,
Rolf Oppliger
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Agile Practices
Practice: Project Data Sheet
Practice: Customer Team-Developer Team Interface
Progress
Structure and Tools
High-Speed Signal Propagation[c] Advanced Black Magic
Power Ratios
Ideal Transmission Line
Impedance in Series with the Return Path
Power Supply Filtering for Clock Sources, Repeaters, and PLL Circuits
Reduced-Voltage Signaling
C++ How to Program (5th Edition)
Unformatted I/O using read, write and gcount
When to Use Exception Handling
Case Study: An Interactive Web Page
Class bitset
Multiple Inheritance
Cisco Voice Gateways and Gatekeepers
Review Questions
Dial Plan Considerations
Connecting to PBXs
Gatekeepers with CallManager
GO! with Microsoft Office 2003 Brief (2nd Edition)
Problem Solving
Summary
Problem Solving
Business Running Case
Key Terms
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Files and Directories
Multithreading
Windows Services
Remoting and Enterprise Services
Useful COM Interop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies