did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470290255

Security of Information and Communication Networks

by
  • ISBN13:

    9780470290255

  • ISBN10:

    0470290250

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2009-03-11
  • Publisher: Wiley-IEEE Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $148.53 Save up to $54.96
  • Rent Book $93.57
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Information and communications security is a hot topic in private industry as well as in government agencies. This book provides a complete conceptual treatment of securing information and transporting it over a secure network in a manner that does not require a strong mathematical background. It stresses why information security is important, what is being done about it, how it applies to networks, and an overview of its key issues. It is written for anyone who needs to understand these important topics at a conceptual rather than a technical level.

Author Biography

Stamatios V. Kartalopoulos, PhD, is the Williams Professor in Telecommunications Networking at the ECE/TCOM graduate program at the University of Oklahoma and conducts research activities in optical networking and network security. He is also principal consultant of PhotonExperts, a consultancy on advanced optical technology and optical communications systems and networks. Previously, he defined, led, and managed research and development teams at Bell Laboratories, where he was awarded the President's Award as well as several other awards for excellence. Dr. Kartalopoulos has published both books and research papers extensively, has been awarded nineteen patents, and has lectured at international forums. An IEEE Distinguished Lecturer, he is an IEEE Fellow and member of SPIE, Sigma XI, and Etta Kappa Nu.

Table of Contents

Prefacep. xv
Acknowledgmentsp. xix
About the Authorp. xxi
Introductionp. 1
A Historical Perspective of Information and Network Securityp. 1
Hidden Messagesp. 1
Encoded Messagesp. 3
Modern Cryptography, Watermarking, Steganography, Escrow and Cryptanalysisp. 8
Cryptographyp. 8
Symmetric and Asymmetric Keysp. 9
Hash Functionsp. 10
Security Servicesp. 10
Watermarkingp. 11
Steganographyp. 12
Escrowp. 13
Cryptanalysisp. 14
Network Securityp. 15
ISO/OSI Reference Model and Securityp. 18
Security Threatening Attacks and Actionsp. 21
Information Security Attacksp. 22
Virusp. 23
Trojan Horsesp. 24
Wormsp. 25
Phishing and Pharmingp. 26
Protecting the Computer from Virusesp. 28
VPN Networksp. 29
Tunnelingp. 29
VPN Securityp. 29
IPsecp. 31
Network Security Attacksp. 33
Network and Service Availabilityp. 33
Network Attacksp. 33
Counter-Attacking Intelligent Networksp. 35
Referencesp. 36
Mathematical Foundationsp. 41
Introductionp. 41
Logarithmsp. 41
Prime Numbersp. 42
Modulus Arithmeticp. 43
Greatest Common Divisorp. 44
The Classical Euclidean Algorithmp. 45
The Binary GCD Algorithmp. 45
Groupsp. 46
Ringsp. 48
Fieldsp. 48
The Fermat's Theoremp. 49
The Euler's Theoremp. 50
Exclusive-Orp. 51
Random Numbersp. 52
Referencesp. 53
Ciphers and Algorithmsp. 55
Symmetric/Asymmetric Ciphersp. 55
Symmetric Ciphersp. 56
The Direct Substitution or Random Shift Cipherp. 56
Shift Cipherp. 57
The Permutation Cipherp. 58
Block Ciphersp. 58
The Data Encryption Standard (DES)p. 59
The Advanced Encryption Standard (AES)p. 61
The RC4 Algorithmp. 64
The RC5 and RC6 Algorithmsp. 64
Other Well-Known Algorithmsp. 66
Asymmetric Cipher Systemsp. 67
Factorization Problemsp. 67
The Race for Unbreakable Codesp. 68
Elliptic Curve Cryptosystemsp. 69
A Primer on Elliptic Curves and Elliptic Curve Factorizationp. 70
Elliptic Curves Over Real Numbersp. 72
Elliptic Curves Over Real and Prime Numbersp. 75
Elliptic Curves Over Binary Numbersp. 76
Cyclic Groupsp. 78
Applicability of Elliptic Curves to Cryptographyp. 78
ECC Proceduresp. 79
Comparing ECC with DH and with RSAp. 80
The RSA Algorithmp. 81
Key Managementp. 82
Referencesp. 83
Cryptographic Key Distribution Systemsp. 87
Key Distributionp. 87
Symmetric Key Distributionp. 88
Key Revocationp. 88
New Key Distributionp. 89
Asymmetric Key Distributionp. 89
Commuting Key Distributionp. 90
Shared Key Distributionp. 91
Merkle's Puzzle Methodp. 91
Shamir's Key Distribution Methodp. 93
Diffie-Hellman Key Exchange Distributionp. 93
Digital Signature Systemsp. 95
The Trusted Third Party or Key Escrow Encryption Systemp. 98
Referencesp. 99
Chaotic Cryptographic Systemsp. 101
Fundamentals of Chaotic Processesp. 101
The Chaotic Regimep. 102
Chaos Annulling Trapsp. 106
Application of Chaotic Systems to Communicationsp. 108
Application of Chaotic Systems to Cryptographyp. 109
The Baptista Methodp. 109
The Lorenz Methodp. 110
Synchronization of Chaotic Processesp. 111
The Karalopoulos Methodp. 112
Referencesp. 114
Communication Security Layer Classificationsp. 115
A Synergistic Security Frameworkp. 115
Information/Application Security Layerp. 117
MAC/Control Security Layerp. 117
Network Security Layerp. 117
Physical Layer Securityp. 117
Firewalls and Gatewaysp. 118
Security Cross-Portfoliop. 119
Attacks and Security in the Internetp. 119
TACACS, SNMP and UDPp. 124
Referencesp. 125
Network Security: Wireless Systemsp. 127
Wireless Networksp. 128
WLANp. 129
IEEE 802.11 WLANp. 130
IEEE 802.11 WLAN Architecturep. 130
IEEE 802.11 Channel Allocationp. 131
IEEE 802.11 Advantages and Disadvantagesp. 133
WLAN Securityp. 134
Wi-Fi, WPA and WPA2p. 136
EAP, EAPOL and RADIUSp. 138
The IEEE 802.11i Robust Security Networkp. 139
IEEE 802.11i Vulnerabilitiesp. 139
Wireless Mobile Access Networksp. 140
GSMp. 141
GSM Network Architecturep. 141
GSM Securityp. 143
GSM Full Duplex Secure Data Transmissionp. 144
B3G/4Gp. 145
B3G/4G Security Concernsp. 145
WiMaxp. 146
WiMax Securityp. 147
IP Multimedia Subsystemsp. 149
IMS Securityp. 150
Bluetoothp. 151
Bluetooth Securityp. 153
Wireless Personal Area Networksp. 155
Wireless Personal Area Networks Securityp. 156
Communications Satellite Networksp. 157
Communications Satellite Networks Securityp. 161
Wireless Ad-Hoc Networksp. 163
Wireless Ad-Hoc Network Securityp. 165
Referencesp. 168
Network Security: Wired Systemsp. 173
Introductionp. 173
Wired Networksp. 175
The Loop Plant and the Trunk Plantp. 176
Analog Loops and Digital Loopsp. 177
Signaling System 7p. 182
Getting Connected Across the Networkp. 183
Network Synchronizationp. 184
Signal Performancep. 185
Security Issuesp. 186
Security Comparison Between PSDN and IPp. 187
Referencesp. 188
Network Security: Optical Systemsp. 189
Introductionp. 189
Layers of Network Securityp. 190
Security of Optical Access Networkp. 191
Passive Optical Networks and Fiber-to-the-Premisesp. 191
Security and Vulnerabilities of PONsp. 198
Types of Attacks in Optical Access Networksp. 198
Interception of the Physical Plantp. 198
Eavesdroppingp. 199
Source Mimicking and Theft of Servicep. 200
Attacking the Supervisory Channelp. 200
Security Measuresp. 200
Detecting Fiber Instruction and Countermeasure Strategiesp. 201
Backbone Optical Networksp. 201
Cyber-Attack Detection Mechanismsp. 202
Channel Performance Vector as Channel Signaturep. 202
Discriminating Between Faults and Attacksp. 204
Method for Estimating the Performance Vector and Channel IDp. 206
Architecting the Performance Vector Circuitp. 209
Self-Protecting Optical Linksp. 210
Intrusion Detection and Reaction Scenariosp. 210
Self-Protecting with Countermeasure Intelligence Networksp. 211
Simultaneous Multiple Channel Protectionp. 213
Simultaneous Multiple Channel Equalizationp. 213
Intrusion Counter-Attacking Networksp. 214
A WDM Method Applicable to Link Securityp. 214
The Wavelength-Busp. 215
Bandwidth Capacity and Bandwidth Elasticity of the ¿-Busp. 217
Security Aspects with the ¿-Bus Based on a Multi-Strand DNA Modelp. 218
Multiplex Random Schedulerp. 219
Temporal Wavelength-Bus Randomizerp. 219
The Hybrid Methodp. 220
Free Space Optical Networksp. 221
FSO Technology Overviewp. 221
FSO Mesh Topologyp. 223
FSO Protection Strategies and Fault Avoidancep. 224
FSO Securityp. 225
Security Testingp. 226
RNG and PRNG Testingp. 226
Cryptographic Algorithm Testingp. 228
Cryptanalysis as a Security Testing Toolp. 229
Referencesp. 231
Quantum Networksp. 237
Introductionp. 237
Quantum Mechanics Not-for-Dummiesp. 238
Electron Interferometryp. 238
Photon Interferometryp. 240
Convergence of Two Radical Ideas in Quantum Mechanicsp. 243
Superposition of States, Qubits and Qu-Registersp. 243
Quantum Cryptographyp. 246
Pre-Quantum Cryptographic Erap. 247
Post-Classical Cryptographic Erap. 248
Photon Polarization Statesp. 249
Orthogonal Statesp. 251
Creating Orthogonal Statesp. 252
Photon Polarization Statesp. 253
The Poincaré Spherep. 253
Rotating States of Polarizationp. 254
Qubit Basis Statesp. 254
Rules of Quantum Cryptography Algorithmsp. 255
The BB84 Protocolp. 256
The B92 Protocolp. 258
The K05 Protocolp. 259
The K08 Protocolp. 261
Entangled Photon Pairs and the Eckert Algorithmp. 263
Quantum Teleportationp. 264
Vulnerabilities of Pragmatic Quantum Cryptographyp. 266
Referencesp. 268
Next Generation Optical Network Securityp. 273
Introductionp. 273
Standardized Protocols for Cost-Efficient Optical Networksp. 274
The Generic Framing Protocolp. 274
GFP Client Payload Multiplexingp. 275
GFP Frame Structurep. 276
GFP Header Error Control and Delineationp. 277
GFP Frame Structurep. 277
GFP Modesp. 278
The Link Capacity Adjustment Scheme LCASp. 279
Concatenation Efficiencyp. 280
Security in the Next Generation SONET/SDHp. 281
Referencesp. 282
Biometrics in Communication Networksp. 285
Introductionp. 285
Biometric Typesp. 286
Biometrics and Cryptographyp. 288
Local and Remote Authenticationp. 288
Biometrics Remote Authenticationp. 289
Referencesp. 290
Acronymsp. 291
Indexp. 299
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program