Security of information and communication networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 316 S. graph. Darst. |
ISBN: | 0470290250 9780470290255 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035355324 | ||
003 | DE-604 | ||
005 | 20100512 | ||
007 | t | ||
008 | 090310s2009 d||| |||| 00||| eng d | ||
015 | |a GBA8D8594 |2 dnb | ||
020 | |a 0470290250 |9 0-470-29025-0 | ||
020 | |a 9780470290255 |9 978-0-470-29025-5 | ||
035 | |a (OCoLC)280396316 | ||
035 | |a (DE-599)HBZHT015785134 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-12 |a DE-473 |a DE-83 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.82 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ZN 6000 |0 (DE-625)157489: |2 rvk | ||
084 | |a ZN 6100 |0 (DE-625)157505: |2 rvk | ||
084 | |a ZN 6220 |0 (DE-625)157529: |2 rvk | ||
100 | 1 | |a Kartalopoulos, Stamatios V. |d 1942- |e Verfasser |0 (DE-588)135593417 |4 aut | |
245 | 1 | 0 | |a Security of information and communication networks |c Stamatios V. Kartalopoulos |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2009 | |
300 | |a XXI, 316 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Réseaux d'information - Sécurité - Mesures | |
650 | 4 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsnetz |0 (DE-588)4349922-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Informationsnetz |0 (DE-588)4349922-3 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017159400&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017159400 |
Datensatz im Suchindex
_version_ | 1804138677925838848 |
---|---|
adam_text | Contents
Preface
xv
Acknowledgments
xix
About the Author
xxi
1.
Introduction
1.1
A Historical Perspective of Information and Network Security
1
1.1.1
Hidden Messages
1
1.1.2
Encoded Messages
3
1.2
Modern Cryptography, Watermarking, Steganography, Escrow and
Cryptanalysis
8
1.2.1
Cryptography
8
1.2.1.1
Symmetric and Asymmetric Keys
9
1.2.1.2
Hash Functions
10
1.2.1.3
Security Services
10
1.2.2
Watermarking
11
1.2.3
Steganography
12
1.2.4
Escrow
13
1.2.5
Cryptanalysis
14
1.3
Network Security
15
1.3.1
ISO/OSI Reference Model and Security
18
1.4
Security Threatening Attacks and Actions
21
1.4.1
Information Security Attacks
22
1.4.1.1
Virus
23
1.4.1.2
Trojan Horses
24
1.4.1.3
Worms
25
1.4.1.4
Phishing and Pharming
26
1.4.1.5
Protecting the Computer from Viruses
28
1.4.2
VPN Networks
29
1.4.2.1
Tunneling
29
1.4.2.2
VPN Security
29
1.4.2.3
IPsec
31
1.4.3
Network Security Attacks
33
1.4.3.1
Network and Service Availability
33
1.4.3.2
Network Attacks
33
1.4.3.3
Counter-Attacking Intelligent Networks
35
References
36
vii
X
Contents
7. Network
Security: Wireless Systems
127
7.1
Wireless Networks
128
7.2
WLAN
129
7.2.1
IEEE
802.11
WLAN
130
7.2.2
IEEE
802.11
WLAN Architecture
130
7.2.3
IEEE
802.11
Channel Allocation
131
7.2.4
IEEE
802.11
Advantages and Disadvantages
133
7.2.5
WLAN Security
134
7.3
Wi-Fi, WPA and WPA2
136
7.4
ΕΑΡ,
EAPOL and RADIUS
138
7.4.1
The IEEE
802.11
і
Robust Security Network
139
7.4.2
IEEE
802.1
li
Vulnerabilities
139
7.5
Wireless Mobile Access Networks
140
7.5.1
GSM
141
7.5.1.1
GSM Network Architecture
141
7.5.1.2
GSM Security
143
7.5.1.3
GSM Full Duplex Secure Data Transmission
144
7.6
B3G/4G
145
7.6.1
В
3G/4G Security Concerns
145
7.7
WiMax
146
7.7.1
WiMax Security
147
7.8
IP Multimedia Subsystems
149
7.8.1
IMS Security
150
7.9
Bluetooth
151
7.9.1
Bluetooth Security
153
7.10
Wireless Personal Area Networks
155
7.10.1
Wireless Personal Area Networks Security
156
7.11
Communications Satellite Networks
157
7.11.1
Communications Satellite Networks Security
161
7.12
Wireless
Ad
-Нос
Networks
163
7.12.1
Wireless
Ad
-Нос
Network Security
165
References
168
8.
Network Security: Wired Systems
173
8.1
Introduction
173
8.2
Wired Networks
175
8.2.1
The Loop Plant and the Trunk Plant
176
8.2.2
Analog Loops and Digital Loops
177
8.2.3
Signaling System
7 182
8.2.4
Getting Connected Across the Network
183
8.2.5
Network Synchronization
184
8.2.6
Signal Performance
185
8.3
Security Issues
186
8.4
Security Comparison Between PSDN and IP
187
References
188
Contents xi
9. Network
Security: Optical
Systems 189
9.1
Introduction
189
9.2
Layers of
Network
Security
190
9.3
Security of Optical Access Network
191
9.3.1
Passive Optical Networks and Fiber-to-the-Premises
191
9.3.2
Security and Vulnerabilities of PONs
198
9.3.3
Types of Attacks in Optical Access Networks
198
9.3.3.1
Interception of the Physical Plant
198
9.3.3.2
Eavesdropping
199
9.3.3.3
Source Mimicking and Theft of Service
200
9.3.3.4
Attacking the Supervisory Channel
200
9.3.3.5
Security Measures
200
9.3.4
Detecting Fiber Intrusion and Countermeasure
Strategies
201
9.3.5
Backbone Optical Networks
201
9.4
Cyber-Attack Detection Mechanisms
202
9.4.1
Channel Performance Vector as Channel Signature
202
9.4.2
Discriminating Between Faults and Attacks
204
9.4.3
Method for Estimating the Performance Vector and
Channel ID
206
9.4.4
Architecting the Performance Vector Circuit
209
9.4.5
Self-Protecting Optical Links
210
9.4.5.1
Intrusion Detection and Reaction Scenarios
210
9.4.5.2
Self-Protecting with Countermeasure
Intelligence Networks
211
9.4.5.3
Simultaneous Multiple Channel Protection
213
9.4.5.4
Simultaneous Multiple Channel
Equalization
213
9.4.5.5
Intrusion Counter-Attacking Networks
214
9.5
A WDM Method Applicable to Link Security
214
9.5.1
The Wavelength-Bus
215
9.5.2
Bandwidth Capacity and Bandwidth Elasticity of the
λ
-Bus
217
9.5.3
Security Aspects with the
λ
-Bus
Based on a Multi-Strand
DNA
Model
218
9.5.3.1
Multiplex Random Scheduler
219
9.5.3.2
Temporal Wavelength-Bus Randomizer
219
9.5.3.3
The Hybrid Method
220
9.6
Free Space Optical Networks
221
9.6.1
FSO
Technology Overview
221
9.6.2
FSO
Mesh Topology
223
9.6.3
FSO
Protection Strategies and Fault Avoidance
224
9.6.4
FSO
Security
225
9.7
Security Testing
226
9.7.1
RNG and PRNG Testing
226
9.7.2
Cryptographic Algorithm Testing
228
9.7.3
Cryptanalysis as a Security Testing Tool
229
References
231
xii Contents
10. Quantum Networks 237
10.1
Introduction
237
10.2 Quantum
Mechanics
Not-for-Dummies 238
10.2.1 Electron
Interferometry
238
10.2.2 Photon
Interferometry
240
10.2.3
Convergence of Two Radical Ideas in Quantum
Mechanics
243
10.2.4
Superposition of States, Qubits and Qu-Registers
243
10.3
Quantum Cryptography
246
10.3.1
Pre-Quantum Cryptographic Era
247
10.3.2
Post-Classical Cryptographic Era
248
10.3.3
Photon Polarization States
249
10.3.3.1
Orthogonal States
251
10.3.3.2
Creating Orthogonal States
252
10.3.4
Photon Polarization States
253
10.3.4.1
The
Poincaré
Sphere
253
10.3.4.2
Rotating States of Polarization
254
10.3.4.3
Qubit Basis States
254
10.3.4.4
Rules of Quantum Cryptography Algorithms
255
10.3.5
The BB84 Protocol
256
10.3.6
The B92 Protocol
258
10.3.7
The K05 Protocol
259
10.3.8
The K08 Protocol
261
10.3.9
Entangled Photon Pairs and the
Eckert
Algorithm
263
10.3.10
Quantum
Teleportation
264
10.3.11
Vulnerabilities of Pragmatic Quantum Cryptography
266
References
268
11.
Next Generation Optical Network Security
273
11.1
Introduction
273
11.2
Standardized Protocols for Cost-Efficient Optical Networks
274
11.2.1
The Generic Framing Protocol
274
11.2.
11.2.
11.2.
11.2.
. 1
GFP Client Payload Multiplexing
275
.2
GFP Frame Structure
276
.3
GFP Header Error Control and Delineation
277
.4
GFP Frame Structure
277
.5
GFP Modes
278
11.2.2
The Link Capacity Adjustment Scheme LCAS
279
11.2.3
Concatenation Efficiency
280
11.3
Security in the Next Generation SONET/SDH
281
References
282
12.
Biometrics in Communication Networks
285
12.1
Introduction
285
12.2 Biometrie
Types
286
12.3
Biometrics and Cryptography
288
Contents xiii
12.4
Local and
Remote
Authentication
288
12.5
Biometrics Remote Authentication
289
References
290
Acronyms
291
Index
299
|
any_adam_object | 1 |
author | Kartalopoulos, Stamatios V. 1942- |
author_GND | (DE-588)135593417 |
author_facet | Kartalopoulos, Stamatios V. 1942- |
author_role | aut |
author_sort | Kartalopoulos, Stamatios V. 1942- |
author_variant | s v k sv svk |
building | Verbundindex |
bvnumber | BV035355324 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 277 ZN 6000 ZN 6100 ZN 6220 |
ctrlnum | (OCoLC)280396316 (DE-599)HBZHT015785134 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01961nam a2200493 c 4500</leader><controlfield tag="001">BV035355324</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100512 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090310s2009 d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA8D8594</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470290250</subfield><subfield code="9">0-470-29025-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470290255</subfield><subfield code="9">978-0-470-29025-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)280396316</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT015785134</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6000</subfield><subfield code="0">(DE-625)157489:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6100</subfield><subfield code="0">(DE-625)157505:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6220</subfield><subfield code="0">(DE-625)157529:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kartalopoulos, Stamatios V.</subfield><subfield code="d">1942-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)135593417</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of information and communication networks</subfield><subfield code="c">Stamatios V. Kartalopoulos</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 316 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'information - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsnetz</subfield><subfield code="0">(DE-588)4349922-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationsnetz</subfield><subfield code="0">(DE-588)4349922-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017159400&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017159400</subfield></datafield></record></collection> |
id | DE-604.BV035355324 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:32:00Z |
institution | BVB |
isbn | 0470290250 9780470290255 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017159400 |
oclc_num | 280396316 |
open_access_boolean | |
owner | DE-703 DE-12 DE-473 DE-BY-UBG DE-83 |
owner_facet | DE-703 DE-12 DE-473 DE-BY-UBG DE-83 |
physical | XXI, 316 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Kartalopoulos, Stamatios V. 1942- Verfasser (DE-588)135593417 aut Security of information and communication networks Stamatios V. Kartalopoulos Hoboken, NJ Wiley 2009 XXI, 316 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Réseaux d'information - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data encryption (Computer science) Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Informationsnetz (DE-588)4349922-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Informationsnetz (DE-588)4349922-3 s Datensicherung (DE-588)4011144-1 s DE-604 Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017159400&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kartalopoulos, Stamatios V. 1942- Security of information and communication networks Réseaux d'information - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data encryption (Computer science) Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Informationsnetz (DE-588)4349922-3 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4011144-1 (DE-588)4349922-3 |
title | Security of information and communication networks |
title_auth | Security of information and communication networks |
title_exact_search | Security of information and communication networks |
title_full | Security of information and communication networks Stamatios V. Kartalopoulos |
title_fullStr | Security of information and communication networks Stamatios V. Kartalopoulos |
title_full_unstemmed | Security of information and communication networks Stamatios V. Kartalopoulos |
title_short | Security of information and communication networks |
title_sort | security of information and communication networks |
topic | Réseaux d'information - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data encryption (Computer science) Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Informationsnetz (DE-588)4349922-3 gnd |
topic_facet | Réseaux d'information - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data encryption (Computer science) Rechnernetz Datensicherung Informationsnetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017159400&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kartalopoulosstamatiosv securityofinformationandcommunicationnetworks |