Security technologies for the World Wide Web:
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Oppliger, Rolf (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boston, MA Artech House ©2000
Schriftenreihe:Artech House computer security series
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:"Artech House computing library.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
Includes bibliographical references and index
Internet -- - WWW -- - Vulnerabilities, threats, and countermeasures -- - Generic security model -- - Security policy -- - Host security -- - Network security -- - Organizational security -- - Legal security -- - HTTP Security -- - HTTP -- - User authentication, authorization, and access control -- - Basic authentication -- - Digest access authentication -- - Certificate-based authentication -- - Sever configuration -- - Configuring HTTP basic authentication -- - Configuring HTTP digest access authentication -- - Proxy Servers and Firewalls -- - Static packet filtering -- - Dynamic packet filtering or stateful inspection -- - Circuit-level gateways -- - Application-level gateways -- - Firewall configurations -- - Dual-homed firewall -- - Screened host firewall -- - Screened subnet firewall -- - Network address translation -- - Configuring the browser -- - Cryptographic Techniques -- - Cryptographic hash functions -- - Secret key cryptography -- - DES -- - Triple-DES -- - IDEA -- - SAFER -- - Blowfish -- - CAST-128 -- - RC2, RC4, RC5, and RC6 -- - AES -- - Public key cryptography -- - RSA -- - Diffie-Hellman -- - ElGamal -- - DSS -- - ECC -- - Digital envelopes -- - Protection of cryptographic keys -- - Generation of pseudorandom bit sequences -- - Legal issues -- - Patent claims -- - Regulations -- - Electronic and digital signature legislation -- - Internet Security Protocols -- - Network access layer security protocols -- - Layer 2 Forwarding Protocol -- - Point-to-Point Tunneling Protocol -- - Layer 2 Tunneling Protocol -- - Virtual private networking -- - Internet layer security protocols -- - IP security architecture
Beschreibung:1 Online-Ressource (xxi, 419 pages)
ISBN:0585337659
1580530451
9780585337654
9781580530453

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen