Networking Security and Standards: The Springer International Series in Engineering and Computer Science, cartea 394
Autor Weidong Kouen Limba Engleză Hardback – 31 mar 1997
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 967.11 lei 6-8 săpt. | |
Springer Us – 4 oct 2012 | 967.11 lei 6-8 săpt. | |
Hardback (1) | 973.27 lei 6-8 săpt. | |
Springer Us – 31 mar 1997 | 973.27 lei 6-8 săpt. |
Din seria The Springer International Series in Engineering and Computer Science
- Preț: 119.98 lei
- 24% Preț: 1041.97 lei
- 20% Preț: 422.81 lei
- Preț: 206.36 lei
- 20% Preț: 313.26 lei
- 20% Preț: 632.66 lei
- 23% Preț: 687.70 lei
- 18% Preț: 1204.93 lei
- 18% Preț: 948.75 lei
- 20% Preț: 635.23 lei
- 18% Preț: 932.78 lei
- 20% Preț: 635.73 lei
- 15% Preț: 626.72 lei
- 20% Preț: 632.97 lei
- 18% Preț: 933.22 lei
- 20% Preț: 633.63 lei
- 20% Preț: 978.13 lei
- 20% Preț: 635.09 lei
- 18% Preț: 930.90 lei
- 20% Preț: 978.77 lei
- 18% Preț: 940.85 lei
- 20% Preț: 634.12 lei
- 15% Preț: 638.60 lei
- 18% Preț: 934.19 lei
- 18% Preț: 1200.75 lei
- 18% Preț: 941.47 lei
- 15% Preț: 633.14 lei
- 18% Preț: 932.47 lei
- 18% Preț: 931.38 lei
- 20% Preț: 1262.96 lei
Preț: 973.27 lei
Preț vechi: 1216.58 lei
-20% Nou
Puncte Express: 1460
Preț estimativ în valută:
186.26€ • 194.05$ • 154.87£
186.26€ • 194.05$ • 154.87£
Carte tipărită la comandă
Livrare economică 10-24 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780792398905
ISBN-10: 0792398904
Pagini: 207
Ilustrații: XVI, 207 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.5 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
ISBN-10: 0792398904
Pagini: 207
Ilustrații: XVI, 207 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.5 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. Business Fundamentals of Security.- 1.1 Principles of Security.- 1.2 Identification and Authentication.- 1.3 Access Control.- 1.4 Confidentiality.- 1.5 Data Integrity.- 1.6 Non-Repudiation.- 1.7 Security Management.- 1.8 Security Regulation.- 1.9 Security Standards.- 2. Technical Fundamentals of Security.- 2.1 Secret and Public Key Cryptography.- 2.2 Secret Key Encryption.- 2.3 Public Key Encryption.- 2.4 Message Digest and Authentication.- 2.5 Digital Signature.- 2.6 Key Management.- 2.7 Identity Authentication.- 2.8 Key Escrow Encryption.- 2.9 Cryptoanalysis.- 3. Security Architecture Standard.- 3.1 ISO 7498 Basic Reference Model for OSI.- 3.2 ISO 7498–2 Security Architecture.- 3.3 Security Services.- 3.4 Security Mechanisms.- 3.5 Relationship of Security Services, Mechanisms and Layers.- 3.6 Placement of Security Services and Mechanisms.- 3.7 Security Management.- 4. Data Encryption Standards.- 4.1 ANSI X3.92 Data Encryption Standard (DES).- 4.2 ANSI X3.106 DEA — Modes of Operation.- 4.3 ANSI X9.23 Standard.- 5. Key Management Standards.- 5.1 ANSI X9.17 Standard.- 5.2 ANSI X9.24 Standard.- 6. Data Integrity Standards.- 6.1 ANSI X9.9 Standard.- 6.2 ANSI X9.19 Standard.- 6.3 NIST FIPS 180 Secure Hash Standard.- 7. Digital Signature Standards.- 7.1 NIST FIPS 186 Digital Signature Standard.- 7.2 RSA Digital Signature (CCITT X.509, ANSI X9.31, and ISO 9796).- 8. Sign-On Authentication Standard.- 8.1 ANSI X9.26 Sign-On Authentication.- 8.2 ANSI X9.26 Interoperability.- 9. Directory and Certificate Standards.- 9.1 CCITT X.500 Standard.- 9.2 CCITT X.509 Standard.- 10. Electronic Mail Standards.- 10.1 CCITT X.400 Message Handling Systems.- 10.2 Security in CCITT X.400.- 10.3 Security in CCITT X.411.- 10.4 Security in CCITT X.420.- 11. Electronic Data InterchangeStandards.- 11.1 ANSI X12 EDI and ISO EDIFACT Standards.- 11.2 Secure EDI (ANSI X12.58).- 11.3 Secure EDIFACT (ISO 9735).- 12. Security Application Technologies.- 12.1 RSA Public Key Cryptography Standards.- 12.2 DoD Security Classifications.- 12.3 Kerberos and KryptoKnight.- 12.4 Firewall.- 12.5 Internet Secure Protocols: SSL and SHTTP.- 12.6 Private Communication Technology Protocols.- 12.7 Java Security.- 12.8 Internet Keyed Payment Protocols.- 12.9 Security Transaction Technology.- 12.10 Secure Electronic Transaction.- 12.11 Digital Cash and Digital Check.- 12.12 Smart Cards.- 12.13 Security for Lotus Notes.- 12.14 Database Security.