Internet Security SECRETS, Volume 1
With each passing day, more and more people depend on the Internet for more and more services. This makes Internet security more important than ever. This important guide provides the technical, managerial, and philosophical framework needed to understand and utilize Internet security.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Identifying Internet Security Threats
Problems in Managing Keys
37 other sections not shown
access control administrator agencies algorithm anonymous application architecture attack authentication bank bastion host certificate certifying authority chapter Clipper chip commercial communications computer crime configuration connection credit card cryptography database decrypt device digital signature e-mail electronic commerce electronic mail electronic money enables encryption escrow example federal filtering firewall hackers header host identify implementation individual information systems Infrastructure integrity Intemet Internet security intruder issuer issues key escrow law enforcement mechanisms ment meter monitoring National NetBill NIST NREN NSPs operations organizations packet password payment penetration testing penetration-testing personal information principles private key problem protection protocol public component public key public-key cryptography recipient remote require response risk router RSADSI secret server signed smart card specific standards tion traffic transaction unauthorized Unicard UNIX users valid verify vulnerabilities