Internet and Wireless Security. Telecommunications - Product Image

Internet and Wireless Security. Telecommunications

  • ID: 3527879
  • Book
  • IET Books
1 of 4

Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.

Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.

This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.

Note: Product cover images may vary from those shown
2 of 4
- Chapter 1: Building on Rock Rather Than Sand
- Chapter 2: XML and Security
- Chapter 3: Using XML Security Mechanisms
- Chapter 4: Security Modelling Language
- Chapter 5: Public Key Infrastructures - the Next Generation
- Chapter 6: An Overview of Identifier-Based Public Key Cryptography
- Chapter 7: Secure Digital Archiving of High-Value Data
- Chapter 8: Wireless Security
- Chapter 9: Adapting Public Key Infrastructures to the Mobile Environment
- Chapter 10: TETRA Security
- Chapter 11: Firewalls - Evolve or Die
- Chapter 12: The Ignite Managed Firewall and VPN Service
- Chapter 13: Information Assurance
- Chapter 14: Biometrics - Real Identities for a Virtual World
- Chapter 15: Transforming the 'Weakest Link' - a Human-Computer
- Chapter 16: Security Management Standard - ISO 17799/BS7799
Note: Product cover images may vary from those shown
3 of 4


4 of 4
Robert Temple

Robert Temple is the chief security architect for BTexact Technologies. He is responsible for business development of BTexact's core security competence and for reviewing and assessing new security technologies. He has worked for BT for 16 years in the systems development field, concentrating on IT security and, most recently, on commercial deployment of PKI. Prior to his current role, Temple was head of group security policy and also head of the IT security unit. He is a member of the Steering Group of the European Electronic Signature Standardisation Initiative, the BCS, the Information Security Committee and the Association for Computing Machinery.

John Regnault

John Regnault is head of security solutions for BTexact Technologies. He has worked for BT for 30 years, specialising in research and development on a wide range of communications technologies, and has published 35 technical papers. During the past eight years Regnault has developed and expanded the scope of BT's security research team. His team of 25 security specialists is now responsible for consulting on new security issues resulting from advances in technology across the BT group. This team covers a wide range of application areas including encryption, PKIs and secure network communications.

Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown