Skip to product information
1 of 1
Regular price £58.97 GBP
Regular price £73.99 GBP Sale price £58.97 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 4 days lead

Security of e-Systems and Computer Networks

Describes tools of e-security and a range of applications, including recently developed technologies like Trust management systems and biometrics-based security.

Mohammad Obaidat (Author), Noureddine Boudriga (Author)

9780521837644, Cambridge University Press

Hardback, published 14 June 2007

386 pages, 43 b/w illus.
25.5 x 18.2 x 2.4 cm, 0.904 kg

E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

Part I. E-Security: 1. Introduction to e-security
2. Public key cryptosystems
3. Authentication and digital signature
Part II. E-security Tools: 4. Public key infrastructure (PKI) systems
5. Biometric-based security systems
6. Trust management systems in communication networks
Part III. E-Security Applications: 7. e-services security
8. e-government security
9. e-commerce security
10. Wireless LANs security
Part IV. Protecting Enterprises: 11. Intrusion detection systems
12. Virtual private networks
13. Protecting against malware
14. Computer and network security risk management
Index.

Subject Areas: Privacy & data protection [URD], Communications engineering / telecommunications [TJK], Electronics engineering [TJF], Electronics & communications engineering [TJ]

View full details