The lowest-priced brand-new, unused, unopened, undamaged item in its original packaging (where packaging is applicable).Packaging should be the same as what is found in a retail store, unless the item is handmade or was packaged by the manufacturer in non-retail packaging, such as an unprinted box or plastic bag.See details for additional description.
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP and OSI environments - with a focus on inter-system, as opposed to intra- system, security functions. Part I is a technical tutorial introduction to computer network security; Part II describes security standards, protocols and techniques. It covers such topics as cryptography, authentication, access control, and n-repudiation; describes a wide range of standard security protocols and techniques, drawn from international, national, government, and Internet standards; and considers areas such as network and transport layer security, local area network security, security management, and security for applications such as electronic mail, directory services, EDI, and banking.* provides an easy-to-read introduction to basic security techlogies for the n-security-specialist n-mathematician. * describes recent developments, such as: the U.S. Government Digital Signature Algorithm (DSA), Internet Privacy Enhanced Mail (PEM), the IEEE LAN security protocol, security for Internet Simple Network Management Protocol (SNMP), and the OSI Transport Layer Security Protocol (TLSP), Network Layer Security Protocol (NLSP), and Generic Upper Layers Security (GULS) standards. * presents a simple four-level architecture model for determining appropriate architectural placement of security functions in a network. * considers the contents and interrelationships of over 130 security-related standards. * covers the new topic of n-repudiation. * offers detailed coverage of the extensive security features of the X.400 (e-mail) and X-500 (directory) standards.