TY - BOOK AU - Temple,Robert AU - Regnault,John ED - Institution of Electrical Engineers. ED - BTexact Technologies. TI - Internet and wireless security T2 - BTexact communications technology series SN - 0852961979 U1 - 005.8 21 PY - 2002/// CY - London PB - Institution of Electrical Engineers KW - Computer networks KW - Security measures KW - Wireless communication systems N1 - Chapter 1: building on rock rather than sand Chapter 2: xml and security Chapter 3: using xml security mechanisms Chapter 4: security modelling language Chapter 5: public key infrastructures - the next generation Chapter 6: an overview of identifier-based public key cryptography Chapter 7: secure digital archiving of high-value data Chapter 8: wireless security Chapter 9: adapting public key infrastructures to the mobile environment Chapter 10: tetra security Chapter 11: firewalls - evolve or die Chapter 12: the ignite managed firewall and vpn service Chapter 13: information assurance Chapter 14: biometrics - real identities for a virtual world Chapter 15: transforming the 'weakest link' - a human-computer Chapter 16: security management standard - iso 17799/bs7799 ER -