Cambridge Catalogue  
  • Help
Home > Catalogue > Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks


  • 43 b/w illus.
  • Page extent: 386 pages
  • Size: 247 x 174 mm
  • Weight: 0.904 kg

Library of Congress

  • Dewey number: 005.8
  • Dewey version: 22
  • LC Classification: TK5105.59 .O23 2007
  • LC Subject headings:
    • Computer networks--Security measures

Library of Congress Record


 (ISBN-13: 9780521837644)

E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

• Technically oriented with many practical examples • Describes the most recent technologies such as trust management systems, risk management, and biometrics-based security • Discusses applications in real e-based systems such as e-commerce, e-service and e-government systems


Part I. E-Security: 1. Introduction to e-security; 2. Public key cryptosystems; 3. Authentication and digital signature; Part II. E-security Tools: 4. Public key infrastructure (PKI) systems; 5. Biometric-based security systems; 6. Trust management systems in communication networks; Part III. E-Security Applications: 7. e-services security; 8. e-government security; 9. e-commerce security; 10. Wireless LANs security; Part IV. Protecting Enterprises: 11. Intrusion detection systems; 12. Virtual private networks; 13. Protecting against malware; 14. Computer and network security risk management; Index.

printer iconPrinter friendly version AddThis