Author |
---|
E-Mail: rolf.oppliger@esecurity.ch
Phone/Fax: +41 079 654 84 37
Aims and Scope |
---|
Target Audience |
---|
Table of Contents |
---|
1. Introduction
2. TCP/IP Networking
3. Attacks
4. OSI Security Architecture
5. Cryptographic Techniques
6. Authentication and Key Distribution
Part II: ACCESS CONTROL
7. Overview
8. Packet Filtering
9. Circuit-Level Gateways
10. Application-Level Gateways
11. Firewall Configurations
12. Conclusions and Outlook
Part III: COMMUNICATION SECURITY
13. Network Access Layer Security Protocols
14. Internet Layer Security Protocols
15. Transport Layer Security Protocols
16. Application Layer Security Protocols
17. Message Security Protocols
18. Conclusions and Outlook
Part IV: DISCUSSION
19. Public Key Infrastructure
20. Electronic Commerce
21. Risk Management
Epilogue
List of Abbreviations and Acronyms
About the Author
Index
Errata List |
---|
Reviews |
---|