Authentication systems for secure networks:
As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists,...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Artech House
1996
|
Schriftenreihe: | The Artech House computer science library
|
Schlagworte: | |
Zusammenfassung: | As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network |
Beschreibung: | XVII, 186 S. Ill. |
ISBN: | 0890065101 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV011112295 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 961213s1996 xxua||| |||| 00||| engod | ||
020 | |a 0890065101 |9 0-89006-510-1 | ||
035 | |a (OCoLC)34046349 | ||
035 | |a (DE-599)BVBBV011112295 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-91 |a DE-706 |a DE-521 |a DE-634 | ||
050 | 0 | |a TK5105.59.O77 1996 | |
082 | 0 | |a 005.8 |2 20 | |
082 | 0 | |a 005.8 20 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Oppliger, Rolf |e Verfasser |0 (DE-588)1019191988 |4 aut | |
245 | 1 | 0 | |a Authentication systems for secure networks |c Rolf Oppliger |
264 | 1 | |a Boston [u.a.] |b Artech House |c 1996 | |
300 | |a XVII, 186 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Artech House computer science library | |
520 | 3 | |a As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME | |
520 | |a The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network | ||
650 | 7 | |a Authentification |2 ram | |
650 | 7 | |a Cryptographie |2 ram | |
650 | 7 | |a KERBEROS |2 inriac | |
650 | 7 | |a Ordinateurs - Accès - Contrôle |2 ram | |
650 | 7 | |a Réseaux d'ordinateurs - Mesures de sûreté |2 ram | |
650 | 7 | |a authentification |2 inriac | |
650 | 7 | |a contrôle accès |2 inriac | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a système distribué |2 inriac | |
650 | 7 | |a sécurité réseau |2 inriac | |
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Computers -- Access control | |
650 | 4 | |a Authentication | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-007445531 |
Datensatz im Suchindex
_version_ | 1804125603753885696 |
---|---|
any_adam_object | |
author | Oppliger, Rolf |
author_GND | (DE-588)1019191988 |
author_facet | Oppliger, Rolf |
author_role | aut |
author_sort | Oppliger, Rolf |
author_variant | r o ro |
building | Verbundindex |
bvnumber | BV011112295 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59.O77 1996 |
callnumber-search | TK5105.59.O77 1996 |
callnumber-sort | TK 45105.59 O77 41996 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 273 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)34046349 (DE-599)BVBBV011112295 |
dewey-full | 005.8 005.820 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 005.8 20 |
dewey-search | 005.8 005.8 20 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02425nam a2200577 c 4500</leader><controlfield tag="001">BV011112295</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">961213s1996 xxua||| |||| 00||| engod</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0890065101</subfield><subfield code="9">0-89006-510-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)34046349</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011112295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59.O77 1996</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1019191988</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Authentication systems for secure networks</subfield><subfield code="c">Rolf Oppliger</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">1996</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 186 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Artech House computer science library</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Authentification</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">KERBEROS</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Accès - Contrôle</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Réseaux d'ordinateurs - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authentification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">contrôle accès</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">système distribué</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité réseau</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers -- Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007445531</subfield></datafield></record></collection> |
id | DE-604.BV011112295 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:04:11Z |
institution | BVB |
isbn | 0890065101 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007445531 |
oclc_num | 34046349 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-706 DE-521 DE-634 |
owner_facet | DE-91 DE-BY-TUM DE-706 DE-521 DE-634 |
physical | XVII, 186 S. Ill. |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | Artech House |
record_format | marc |
series2 | The Artech House computer science library |
spelling | Oppliger, Rolf Verfasser (DE-588)1019191988 aut Authentication systems for secure networks Rolf Oppliger Boston [u.a.] Artech House 1996 XVII, 186 S. Ill. txt rdacontent n rdamedia nc rdacarrier The Artech House computer science library As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network Authentification ram Cryptographie ram KERBEROS inriac Ordinateurs - Accès - Contrôle ram Réseaux d'ordinateurs - Mesures de sûreté ram authentification inriac contrôle accès inriac cryptographie inriac système distribué inriac sécurité réseau inriac Computer networks -- Security measures Computers -- Access control Authentication Cryptography Authentifikation (DE-588)4330656-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 s DE-604 |
spellingShingle | Oppliger, Rolf Authentication systems for secure networks Authentification ram Cryptographie ram KERBEROS inriac Ordinateurs - Accès - Contrôle ram Réseaux d'ordinateurs - Mesures de sûreté ram authentification inriac contrôle accès inriac cryptographie inriac système distribué inriac sécurité réseau inriac Computer networks -- Security measures Computers -- Access control Authentication Cryptography Authentifikation (DE-588)4330656-1 gnd |
subject_GND | (DE-588)4330656-1 |
title | Authentication systems for secure networks |
title_auth | Authentication systems for secure networks |
title_exact_search | Authentication systems for secure networks |
title_full | Authentication systems for secure networks Rolf Oppliger |
title_fullStr | Authentication systems for secure networks Rolf Oppliger |
title_full_unstemmed | Authentication systems for secure networks Rolf Oppliger |
title_short | Authentication systems for secure networks |
title_sort | authentication systems for secure networks |
topic | Authentification ram Cryptographie ram KERBEROS inriac Ordinateurs - Accès - Contrôle ram Réseaux d'ordinateurs - Mesures de sûreté ram authentification inriac contrôle accès inriac cryptographie inriac système distribué inriac sécurité réseau inriac Computer networks -- Security measures Computers -- Access control Authentication Cryptography Authentifikation (DE-588)4330656-1 gnd |
topic_facet | Authentification Cryptographie KERBEROS Ordinateurs - Accès - Contrôle Réseaux d'ordinateurs - Mesures de sûreté authentification contrôle accès cryptographie système distribué sécurité réseau Computer networks -- Security measures Computers -- Access control Authentication Cryptography Authentifikation |
work_keys_str_mv | AT oppligerrolf authenticationsystemsforsecurenetworks |