Broadband network & device security
Lail, Benjamin M.
Broadband network & device security / Benjamin M. Lail - New York : McGraw-Hill / Osborne, 2002 - xxiii, 473 p. - RSA Press .
Broadband Network Security Fundamentals --An Overview of Broadband Communication --A Brief History of telecommunication --That Was Then --This Is Now --
What is Broadband Access? --Existing Broadband Access Technologies --Cable --
DSL --Fixed Wireless --Two-Way Satellite --The Future of Broadband --Fiber Optics --The Importance of Security in Broadband Networks --Security and the Average User --
Securing the Network Infrastructure --Choosing the Right Tools: Security Services and Cryptography --Security Services and Mechanisms --Confidentiality --
Integrity --Authentication --Nonrepudiation --
Authorization and Access Control --Availability --The Basics of Cryptography --Random Number Generation --Symmetric-Key Cryptography --
Message Digests --
Public-Key Cryptography --
Public-Key Cryptography Standards --
Federal Information Processing Standards and Certification --
Store-and-Forward vs. Session-Based Encryption --
Choosing the Appropriate Cryptographic Tools --
Using Stream Ciphers --Using Block Ciphers --Using Message Digests --Using Public-Key Algorithms --Interoperability Notes --How Secure Is Too Secure? --The Need for Security: Network Threats and Countermeasures --Who, What, and Why? Attackers and Their Motivations --When? "The Network Administrator Went Home Hours Ago ..." --Where? The Internet's a Big Place! --Broadband Access vs. Dial-up Access --Categorizing Common Attacks --Passive Attacks vs. Active Attacks --Eavesdropping --Impersonation --Denial of Service.
9780072194241
Computer networks -- Security measures. Broadband communication systems.
621.3821 / L142
Broadband network & device security / Benjamin M. Lail - New York : McGraw-Hill / Osborne, 2002 - xxiii, 473 p. - RSA Press .
Broadband Network Security Fundamentals --An Overview of Broadband Communication --A Brief History of telecommunication --That Was Then --This Is Now --
What is Broadband Access? --Existing Broadband Access Technologies --Cable --
DSL --Fixed Wireless --Two-Way Satellite --The Future of Broadband --Fiber Optics --The Importance of Security in Broadband Networks --Security and the Average User --
Securing the Network Infrastructure --Choosing the Right Tools: Security Services and Cryptography --Security Services and Mechanisms --Confidentiality --
Integrity --Authentication --Nonrepudiation --
Authorization and Access Control --Availability --The Basics of Cryptography --Random Number Generation --Symmetric-Key Cryptography --
Message Digests --
Public-Key Cryptography --
Public-Key Cryptography Standards --
Federal Information Processing Standards and Certification --
Store-and-Forward vs. Session-Based Encryption --
Choosing the Appropriate Cryptographic Tools --
Using Stream Ciphers --Using Block Ciphers --Using Message Digests --Using Public-Key Algorithms --Interoperability Notes --How Secure Is Too Secure? --The Need for Security: Network Threats and Countermeasures --Who, What, and Why? Attackers and Their Motivations --When? "The Network Administrator Went Home Hours Ago ..." --Where? The Internet's a Big Place! --Broadband Access vs. Dial-up Access --Categorizing Common Attacks --Passive Attacks vs. Active Attacks --Eavesdropping --Impersonation --Denial of Service.
9780072194241
Computer networks -- Security measures. Broadband communication systems.
621.3821 / L142