Advertisement

Networking Security and Standards

  • Authors
  • Weidong Kou

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Weidong Kou
    Pages 1-11
  3. Weidong Kou
    Pages 13-23
  4. Weidong Kou
    Pages 25-47
  5. Weidong Kou
    Pages 49-67
  6. Weidong Kou
    Pages 69-89
  7. Weidong Kou
    Pages 91-106
  8. Weidong Kou
    Pages 107-116
  9. Weidong Kou
    Pages 117-126
  10. Weidong Kou
    Pages 127-138
  11. Weidong Kou
    Pages 139-151
  12. Weidong Kou
    Pages 153-168
  13. Weidong Kou
    Pages 169-197
  14. Back Matter
    Pages 199-207

About this book

Introduction

Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.

Keywords

Internet Standard Standards algorithms architecture data encryption database databases development information management network networks security technology

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4615-6153-8
  • Copyright Information Kluwer Academic Publishers 1997
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4613-7820-4
  • Online ISBN 978-1-4615-6153-8
  • Series Print ISSN 0893-3405
  • Buy this book on publisher's site