Secure Communications: Applications and Management

Roger J. Sutton

  • 出版商: Wiley
  • 出版日期: 2002-01-18
  • 售價: $920
  • 貴賓價: 9.5$874
  • 語言: 英文
  • 頁數: 346
  • 裝訂: Hardcover
  • ISBN: 0471499048
  • ISBN-13: 9780471499046
  • 下單後立即進貨 (約5~7天)



If you need to know more about communication's security management, this is the perfect book for you??

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.

  • Explains the practical links between cryptography and telecommunications

  • Addresses the pertinent issues of implementation of cryptography as a method of protecting information

  • Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material

  • Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection

  • Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions

Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on??

Table of Contents




Acronyms and Abbreviations

1. Threats and Solutions

2. An Introduction to Encryption and Security Management

3. Voice Security in Military Applications

4. Telephone Security

5. Secure GSM Systems

6. Security in Private VHF/UHF Radio Networks

7. Electronic Protection Measures - Frequency Hopping

8. Link and Bulk Encryption

9. Secure Fax Networks

10. PC Security

11. Secure E-mail

12. Secure Virtual Private Networks

13. Military Data Communication

14. Managment, Support and Training