Cambridge Catalog  
  • Your account
  • View basket
  • Help
Home > Catalog > Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks


  • 43 b/w illus.
  • Page extent: 386 pages
  • Size: 247 x 174 mm
  • Weight: 0.904 kg

Library of Congress

  • Dewey number: 005.8
  • Dewey version: 22
  • LC Classification: TK5105.59 .O23 2007
  • LC Subject headings:
    • Computer networks--Security measures

Library of Congress Record

Add to basket


 (ISBN-13: 9780521837644)

In stock

$124.00 (P)

E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.


Part I. E-Security: 1. Introduction to e-security; 2. Public key cryptosystems; 3. Authentication and digital signature; Part II. E-security Tools: 4. Public key infrastructure (PKI) systems; 5. Biometric-based security systems; 6. Trust management systems in communication networks; Part III. E-Security Applications: 7. e-services security; 8. e-government security; 9. e-commerce security; 10. Wireless LANs security; Part IV. Protecting Enterprises: 11. Intrusion detection systems; 12. Virtual private networks; 13. Protecting against malware; 14. Computer and network security risk management; Index.

printer iconPrinter friendly version AddThis