Security management of next generation telecommunications networks and services / Stuart Jacobs.
Material type:
- 9780470565131 (hardback)
- 005.8 23
- TK5105.59 .J329 2014
- COM043050
Item type | Current library | Collection | Call number | Vol info | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
Martin Oduor-Otieno Library This item is located on the library Second Floor | Non-fiction | TK5105.59 .J329 2014 (Browse shelf(Opens below)) | 27250/14 | Available | MOOL14061254 | ||
![]() |
Martin Oduor-Otieno Library This item is located on the library Second Floor | Non-fiction | TK5105.59 .J329 2014 (Browse shelf(Opens below)) | 27251/14 | Available | MOOL14061253 |
Browsing Martin Oduor-Otieno Library shelves, Shelving location: This item is located on the library Second Floor, Collection: Non-fiction Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
TK 5105.59 .D43 2003 Cisco PIX firewalls / | TK5105.59 .G75 2002 Disaster survival guide for business communications networks : | TK5105.59 .J329 2014 Security management of next generation telecommunications networks and services / | TK5105.59 .J329 2014 Security management of next generation telecommunications networks and services / | TK5105.59 .K3 2008 Cryptography and network security / | TK5105.59 .K3 2008 Cryptography and network security / | TK5105.59 .K34 2004 Designing network security / |
Includes bibliographical references and index.
"This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information. "--
"This book considers the evolution of network deployed security mechanisms throughout NGN (Next Generation Networking) infrastructures"--
There are no comments on this title.