Design and analysis of security protocol for communication:
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 an...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2020]
Beverly, MA Scrivener Publishing [2020] |
Schlagworte: | |
Online-Zugang: | FAN01 Volltext |
Zusammenfassung: | Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL) 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xvi, 338 Seiten) |
ISBN: | 9781119555759 |
DOI: | 10.1002/9781119555759 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048596420 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 221206s2020 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781119555759 |c electronic bk. |9 978-1-119-55575-9 | ||
024 | 7 | |a 10.1002/9781119555759 |2 doi | |
035 | |a (OCoLC)1354316206 | ||
035 | |a (DE-599)BVBBV048596420 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-1102 | ||
082 | 0 | |a 005.8 | |
245 | 1 | 0 | |a Design and analysis of security protocol for communication |c edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O. P. Verma |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2020] | |
264 | 1 | |a Beverly, MA |b Scrivener Publishing |c [2020] | |
300 | |a 1 Online-Ressource (xvi, 338 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network | |
520 | 3 | |a 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL) | |
520 | 3 | |a 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Computer network protocols | |
653 | 0 | |a Computer network protocols | |
653 | 0 | |a Computer networks ; Security measures | |
653 | 6 | |a Electronic books | |
700 | 1 | |a Goyal, Dinesh |4 edt | |
700 | 1 | |a Balamurugan, S. |4 edt | |
700 | 1 | |a Peng, Sheng-Lung |d 1965- |0 (DE-588)1210947250 |4 edt | |
700 | 1 | |a Verma, O. P. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-119-55564-3 |
856 | 4 | 0 | |u https://doi.org/10.1002/9781119555759 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
999 | |a oai:aleph.bib-bvb.de:BVB01-033972035 | ||
966 | e | |u https://doi.org/10.1002/9781119555759 |l FAN01 |p ZDB-35-WIC |q FAN_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184638523965440 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Goyal, Dinesh Balamurugan, S. Peng, Sheng-Lung 1965- Verma, O. P. |
author2_role | edt edt edt edt |
author2_variant | d g dg s b sb s l p slp o p v op opv |
author_GND | (DE-588)1210947250 |
author_facet | Goyal, Dinesh Balamurugan, S. Peng, Sheng-Lung 1965- Verma, O. P. |
building | Verbundindex |
bvnumber | BV048596420 |
ctrlnum | (OCoLC)1354316206 (DE-599)BVBBV048596420 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1002/9781119555759 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03475nmm a2200481 c 4500</leader><controlfield tag="001">BV048596420</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221206s2020 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119555759</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-55575-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119555759</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1354316206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048596420</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1102</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Design and analysis of security protocol for communication</subfield><subfield code="c">edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O. P. Verma</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beverly, MA</subfield><subfield code="b">Scrivener Publishing</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 338 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL)</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goyal, Dinesh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balamurugan, S.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peng, Sheng-Lung</subfield><subfield code="d">1965-</subfield><subfield code="0">(DE-588)1210947250</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verma, O. P.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-55564-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781119555759</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033972035</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119555759</subfield><subfield code="l">FAN01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FAN_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048596420 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:08:52Z |
indexdate | 2024-07-10T09:42:31Z |
institution | BVB |
isbn | 9781119555759 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033972035 |
oclc_num | 1354316206 |
open_access_boolean | |
owner | DE-1102 |
owner_facet | DE-1102 |
physical | 1 Online-Ressource (xvi, 338 Seiten) |
psigel | ZDB-35-WIC FAN_PDA_WIC_Kauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Wiley Scrivener Publishing |
record_format | marc |
spelling | Design and analysis of security protocol for communication edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O. P. Verma Hoboken, New Jersey Wiley [2020] Beverly, MA Scrivener Publishing [2020] 1 Online-Ressource (xvi, 338 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL) 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption Computer networks / Security measures Computer network protocols Computer networks ; Security measures Electronic books Goyal, Dinesh edt Balamurugan, S. edt Peng, Sheng-Lung 1965- (DE-588)1210947250 edt Verma, O. P. edt Erscheint auch als Druck-Ausgabe 978-1-119-55564-3 https://doi.org/10.1002/9781119555759 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Design and analysis of security protocol for communication |
title | Design and analysis of security protocol for communication |
title_auth | Design and analysis of security protocol for communication |
title_exact_search | Design and analysis of security protocol for communication |
title_exact_search_txtP | Design and analysis of security protocol for communication |
title_full | Design and analysis of security protocol for communication edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O. P. Verma |
title_fullStr | Design and analysis of security protocol for communication edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O. P. Verma |
title_full_unstemmed | Design and analysis of security protocol for communication edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O. P. Verma |
title_short | Design and analysis of security protocol for communication |
title_sort | design and analysis of security protocol for communication |
url | https://doi.org/10.1002/9781119555759 |
work_keys_str_mv | AT goyaldinesh designandanalysisofsecurityprotocolforcommunication AT balamurugans designandanalysisofsecurityprotocolforcommunication AT pengshenglung designandanalysisofsecurityprotocolforcommunication AT vermaop designandanalysisofsecurityprotocolforcommunication |