Networking Security and Standards: The Springer International Series in Engineering and Computer Science, cartea 394
Autor Weidong Kouen Limba Engleză Hardback – 31 mar 1997
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 983.71 lei 6-8 săpt. | |
Springer Us – 4 oct 2012 | 983.71 lei 6-8 săpt. | |
Hardback (1) | 989.96 lei 6-8 săpt. | |
Springer Us – 31 mar 1997 | 989.96 lei 6-8 săpt. |
Din seria The Springer International Series in Engineering and Computer Science
- 24% Preț: 1041.97 lei
- 20% Preț: 643.50 lei
- 18% Preț: 1225.62 lei
- 18% Preț: 965.02 lei
- 20% Preț: 646.12 lei
- 18% Preț: 948.79 lei
- 20% Preț: 646.62 lei
- 15% Preț: 637.46 lei
- 20% Preț: 643.83 lei
- 18% Preț: 949.23 lei
- 20% Preț: 644.48 lei
- 20% Preț: 994.92 lei
- 20% Preț: 645.97 lei
- 18% Preț: 946.87 lei
- 20% Preț: 995.57 lei
- 18% Preț: 956.99 lei
- 20% Preț: 644.98 lei
- 15% Preț: 649.54 lei
- 18% Preț: 950.21 lei
- 18% Preț: 1221.38 lei
- 18% Preț: 957.62 lei
- 15% Preț: 643.99 lei
- 18% Preț: 948.47 lei
- 18% Preț: 947.35 lei
- 20% Preț: 1284.65 lei
- 20% Preț: 1633.95 lei
- 20% Preț: 1285.78 lei
Preț: 989.96 lei
Preț vechi: 1237.46 lei
-20% Nou
Puncte Express: 1485
Preț estimativ în valută:
189.48€ • 197.07$ • 158.78£
189.48€ • 197.07$ • 158.78£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780792398905
ISBN-10: 0792398904
Pagini: 207
Ilustrații: XVI, 207 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.5 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
ISBN-10: 0792398904
Pagini: 207
Ilustrații: XVI, 207 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.5 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. Business Fundamentals of Security.- 1.1 Principles of Security.- 1.2 Identification and Authentication.- 1.3 Access Control.- 1.4 Confidentiality.- 1.5 Data Integrity.- 1.6 Non-Repudiation.- 1.7 Security Management.- 1.8 Security Regulation.- 1.9 Security Standards.- 2. Technical Fundamentals of Security.- 2.1 Secret and Public Key Cryptography.- 2.2 Secret Key Encryption.- 2.3 Public Key Encryption.- 2.4 Message Digest and Authentication.- 2.5 Digital Signature.- 2.6 Key Management.- 2.7 Identity Authentication.- 2.8 Key Escrow Encryption.- 2.9 Cryptoanalysis.- 3. Security Architecture Standard.- 3.1 ISO 7498 Basic Reference Model for OSI.- 3.2 ISO 7498–2 Security Architecture.- 3.3 Security Services.- 3.4 Security Mechanisms.- 3.5 Relationship of Security Services, Mechanisms and Layers.- 3.6 Placement of Security Services and Mechanisms.- 3.7 Security Management.- 4. Data Encryption Standards.- 4.1 ANSI X3.92 Data Encryption Standard (DES).- 4.2 ANSI X3.106 DEA — Modes of Operation.- 4.3 ANSI X9.23 Standard.- 5. Key Management Standards.- 5.1 ANSI X9.17 Standard.- 5.2 ANSI X9.24 Standard.- 6. Data Integrity Standards.- 6.1 ANSI X9.9 Standard.- 6.2 ANSI X9.19 Standard.- 6.3 NIST FIPS 180 Secure Hash Standard.- 7. Digital Signature Standards.- 7.1 NIST FIPS 186 Digital Signature Standard.- 7.2 RSA Digital Signature (CCITT X.509, ANSI X9.31, and ISO 9796).- 8. Sign-On Authentication Standard.- 8.1 ANSI X9.26 Sign-On Authentication.- 8.2 ANSI X9.26 Interoperability.- 9. Directory and Certificate Standards.- 9.1 CCITT X.500 Standard.- 9.2 CCITT X.509 Standard.- 10. Electronic Mail Standards.- 10.1 CCITT X.400 Message Handling Systems.- 10.2 Security in CCITT X.400.- 10.3 Security in CCITT X.411.- 10.4 Security in CCITT X.420.- 11. Electronic Data InterchangeStandards.- 11.1 ANSI X12 EDI and ISO EDIFACT Standards.- 11.2 Secure EDI (ANSI X12.58).- 11.3 Secure EDIFACT (ISO 9735).- 12. Security Application Technologies.- 12.1 RSA Public Key Cryptography Standards.- 12.2 DoD Security Classifications.- 12.3 Kerberos and KryptoKnight.- 12.4 Firewall.- 12.5 Internet Secure Protocols: SSL and SHTTP.- 12.6 Private Communication Technology Protocols.- 12.7 Java Security.- 12.8 Internet Keyed Payment Protocols.- 12.9 Security Transaction Technology.- 12.10 Secure Electronic Transaction.- 12.11 Digital Cash and Digital Check.- 12.12 Smart Cards.- 12.13 Security for Lotus Notes.- 12.14 Database Security.