This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
Inhaltsverzeichnis
Security threats, services, and mechanisms; security procedures; security management; algorithms; OSI and security; applications, systems, products, and architectures; conclusion; appendices - the open systems interconnection reference model; Shannon's theory of secrecy systems; maximum length sequences; Euler's totient function; finding large prime numbers; factorizing large integers; the CCITT X-400 (1988) message handling systems; Information Technology Security Evaluation Criteria (ITSEC).