Our systems are now restored following recent technical disruption, and we’re working hard to catch up on publishing. We apologise for the inconvenience caused. Find out more

Recommended product

Popular links

Popular links


Security of e-Systems and Computer Networks

Security of e-Systems and Computer Networks

Security of e-Systems and Computer Networks

Mohammad Obaidat, Monmouth University, New Jersey
Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
June 2007
Hardback
9780521837644
£77.99
GBP
Hardback
USD
eBook

    E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

    • Technically oriented with many practical examples
    • Describes the most recent technologies such as trust management systems, risk management, and biometrics-based security
    • Discusses applications in real e-based systems such as e-commerce, e-service and e-government systems

    Product details

    June 2007
    Hardback
    9780521837644
    386 pages
    255 × 182 × 24 mm
    0.904kg
    43 b/w illus.
    Available

    Table of Contents

    • Part I. E-Security:
    • 1. Introduction to e-security
    • 2. Public key cryptosystems
    • 3. Authentication and digital signature
    • Part II. E-security Tools:
    • 4. Public key infrastructure (PKI) systems
    • 5. Biometric-based security systems
    • 6. Trust management systems in communication networks
    • Part III. E-Security Applications:
    • 7. e-services security
    • 8. e-government security
    • 9. e-commerce security
    • 10. Wireless LANs security
    • Part IV. Protecting Enterprises:
    • 11. Intrusion detection systems
    • 12. Virtual private networks
    • 13. Protecting against malware
    • 14. Computer and network security risk management
    • Index.