Internet and Wireless SecurityInternet and Wireless Security
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
eBook, 2002
Current format, eBook, 2002, , All copies in use.eBook, 2002
Current format, eBook, 2002, , All copies in use. Offered in 0 more formatsAs computer security experts with BTexact Technologies, UK, Temple and Renault broach not only technical aspects of the Internet's future covered by these 16 contributed chapters but also the pivotal issue of user trust. In the preface, a colleague of theirs contends that concerns about computer security are impeding wider adoption of electronic commerce by businesses and consumers. Given that people remain the weakest link in human-computer interactions, contributors expand upon the theme of trust via an "iTrust" integrated architecture program, public key cryptology infrastructures (for wired and wireless environments), biometrics, and other approaches to information assurance. The last chapter overviews the latest security management standard and its policy, technical, and commercial implications. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses.
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses.
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses.
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses.
Title availability
About
Contributors
Subject and genre
Details
Publication
- London : Institution of Electrical Engineers, Ă2002.
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
There are no quotations from this title
There are no quotations from this title
From the community