Internet and Intranet Security
A book published by
Artech House Publishers
Rolf Oppliger, Ph.D.
eSECURITY Technologies Rolf Oppliger
Breichtenstrasse 18
CH-3074 Muri b. Bern, Switzerland
E-Mail: rolf.oppliger@esecurity.ch
Phone/Fax: +41 079 654 84 37
When I started to work on Internet and intranet security a couple of years
ago, the situation was comparably simple. There were some authentication
and key distribution systems available that made people believe the
Internet would become secure if only these systems were used and widely
deployed (e.g., Kerberos). It was at this time I wrote
Authentication Systems for Secure Networks, a
companion book also published by Artech House. But after having written
the book, I realized that alternative techniques and mechanisms had been
developed to provide Internet and intranet security. For example, firewalls
started their triumphal march that has continued until today. Also,
cryptographic security protocols for the Internet, transport, and
application layer had been developed, proposed, and partly implemented.
Consequently, I realized that the use of authentication systems is just
one possibility to address Internet security, and that there are other
possibilities as well. In this situation, I decided to write Internet
and Intranet Security to give a more comprehensive overview about
currently available security techniques and mechanisms for TCP/IP-based
networks.
The book has been written to serve the needs of computer and network
professionals that have interest in understanding, establishing, and
supporting secure TCP/IP-based networks. I also hope that the book
provides sufficient background to help security professionals propose
approaches to secure commercial applications for the Internet. The book
is tutorial in nature but still requires some familiarity with the
fundamentals of computer networks and distributed systems, as well as
cryptography and the use of cryptographic protocols in networked and
distributed environments.
Part I: FUNDAMENTALS
1. Introduction
2. TCP/IP Networking
3. OSI Security Architecture
4. Cryptographic Techniques
Part II: ACCESS CONTROL
5. Overview
6. Packet Filters
7. Application Gateways
8. Firewall Configurations
Part III: COMMUNICATION SECURITY
9. Internet Layer Security Protocols
10. Transport Layer Security Protocols
11. Application Layer Security Protocols
12. Conclusions
Part IV: DISCUSSION
13. Electronic Commerce
14. Security Tools
15. Epilog
Glossary
Abbreviations and Acronyms
About the Author
Index
- Page 93, line 18: Replace "... the internediate system ..."
to "... the intermediate system ..." (Reported on April 9,
1999 by Jussipekka Leiwo)
- Page 113, line 8: Replace "... wheras ..." with "... whereas
..." (Reported on April 9, 1999 by Jussipekka Leiwo)
- Page 187, line 3: Replace "... for Solaris and has has source
..." to "... for Solaris and has source ..." (Reported on
April 9, 1999 by Jussipekka Leiwo)
The following people have reviewed the book:
- Mark
Cyzyk for Telecommunications Electronic Review (TER),
Vol. 5, Issue 7, September 1998
- A second edition of the book is available
since November 2001 (ISBN 1-59053-166-0).
Copyright © 2002 Rolf Oppliger