<p>'A valuable contribution to the understanding of security from BTexact Technologies'</p>
Software World
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.
This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.
- Chapter 1: Building on Rock Rather Than Sand
- Chapter 2: XML and Security
- Chapter 3: Using XML Security Mechanisms
- Chapter 4: Security Modelling Language
- Chapter 5: Public Key Infrastructures - the Next Generation
- Chapter 6: An Overview of Identifier-Based Public Key Cryptography
- Chapter 7: Secure Digital Archiving of High-Value Data
- Chapter 8: Wireless Security
- Chapter 9: Adapting Public Key Infrastructures to the Mobile Environment
- Chapter 10: TETRA Security
- Chapter 11: Firewalls - Evolve or Die
- Chapter 12: The Ignite Managed Firewall and VPN Service
- Chapter 13: Information Assurance
- Chapter 14: Biometrics - Real Identities for a Virtual World
- Chapter 15: Transforming the 'Weakest Link' - a Human-Computer
- Chapter 16: Security Management Standard - ISO 17799/BS7799