Security Management of Next Generation Telecommunications Networks and Services

Nonfiction, Computers, Application Software, Computer Security
Cover of the book Security Management of Next Generation Telecommunications Networks and Services by Stuart Jacobs, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stuart Jacobs ISBN: 9781118746981
Publisher: Wiley Publication: October 17, 2013
Imprint: Wiley-IEEE Press Language: English
Author: Stuart Jacobs
ISBN: 9781118746981
Publisher: Wiley
Publication: October 17, 2013
Imprint: Wiley-IEEE Press
Language: English

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information.

More books from Wiley

Cover of the book Group Exercises for Addiction Counseling by Stuart Jacobs
Cover of the book Supporting Student Affairs Professionals by Stuart Jacobs
Cover of the book Fish Pheromones and Related Cues by Stuart Jacobs
Cover of the book Open Services Innovation by Stuart Jacobs
Cover of the book The Handbook of Language and Speech Disorders by Stuart Jacobs
Cover of the book Evidence-Based Infectious Diseases by Stuart Jacobs
Cover of the book Anaesthesia for Veterinary Nurses by Stuart Jacobs
Cover of the book Emergency Response Management of Offshore Oil Spills by Stuart Jacobs
Cover of the book Veterinary Microbiology and Microbial Disease by Stuart Jacobs
Cover of the book Supernova Advisor Teams by Stuart Jacobs
Cover of the book Collaborative Construction Procurement and Improved Value by Stuart Jacobs
Cover of the book Essentials of School Neuropsychological Assessment by Stuart Jacobs
Cover of the book Investing in the Renewable Power Market by Stuart Jacobs
Cover of the book The Blackwell Companion to Social Work by Stuart Jacobs
Cover of the book Make Better Decisions More Often: 30 Minute Reads by Stuart Jacobs
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy