000 | 05683nam a2201189 i 4500 | ||
---|---|---|---|
001 | 5263947 | ||
003 | IEEE | ||
005 | 20200421114113.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 151221s1999 nyua ob 001 eng d | ||
020 |
_a9780470546390 _qelectronic |
||
020 |
_z9780780334908 _qprint |
||
020 |
_z0470546395 _qelectronic |
||
024 | 7 |
_a10.1109/9780470546390 _2doi |
|
035 | _a(CaBNVSL)mat05263947 | ||
035 | _a(IDAMS)0b000064810c3d84 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aTK5102.85 _b.R69 2000eb |
|
082 | 0 | 4 |
_a621.382 _222 |
100 | 1 |
_aRozenblit, Moshe, _d1944- |
|
245 | 1 | 0 |
_aSecurity for telecommunications network management / _cMoshe Rozenblit. |
264 | 1 |
_aNew York : _bIEEE Press, _cc2000. |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[1999] |
|
300 |
_a1 PDF (xxiii, 296 pages) : _billustrations. |
||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aIEEE Press series on network management ; _v12 |
|
504 | _aIncludes bibliographical references (p. 279-283) and index. | ||
505 | 0 | _aPreface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author. | |
506 | 1 | _aRestricted to subscribers or individual electronic text purchasers. | |
520 | _a"Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments.". | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
588 | _aDescription based on PDF viewed 12/21/2015. | ||
650 | 0 |
_aTelecommunication _xSecurity measures. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
655 | 0 | _aElectronic books. | |
695 | _aAccess control | ||
695 | _aArrays | ||
695 | _aAuthentication | ||
695 | _aAuthorization | ||
695 | _aBibliographies | ||
695 | _aBiographies | ||
695 | _aBooks | ||
695 | _aBusiness | ||
695 | _aCatalogs | ||
695 | _aCertification | ||
695 | _aClocks | ||
695 | _aCommunication channels | ||
695 | _aCommunication networks | ||
695 | _aCommunications technology | ||
695 | _aComputer crime | ||
695 | _aContext | ||
695 | _aCustomer service | ||
695 | _aData models | ||
695 | _aDigital signatures | ||
695 | _aEncryption | ||
695 | _aEngines | ||
695 | _aFires | ||
695 | _aFloods | ||
695 | _aGuidelines | ||
695 | _aHistory | ||
695 | _aIP networks | ||
695 | _aIndexes | ||
695 | _aIndustries | ||
695 | _aInformation architecture | ||
695 | _aLaw | ||
695 | _aLayout | ||
695 | _aManuals | ||
695 | _aMediation | ||
695 | _aMonitoring | ||
695 | _aObject recognition | ||
695 | _aOpen systems | ||
695 | _aOrganizations | ||
695 | _aPROM | ||
695 | _aPattern analysis | ||
695 | _aPrivacy | ||
695 | _aProtocols | ||
695 | _aPublic key | ||
695 | _aReceivers | ||
695 | _aResistance | ||
695 | _aSONET | ||
695 | _aSections | ||
695 | _aSecurity | ||
695 | _aServers | ||
695 | _aSoftware | ||
695 | _aStandards | ||
695 | _aSurveillance | ||
695 | _aSyntactics | ||
695 | _aTelecommunication network management | ||
695 | _aTelecommunications | ||
695 | _aTerminology | ||
695 | _aTutorials | ||
710 | 2 |
_aJohn Wiley & Sons, _epublisher. |
|
710 | 2 |
_aIEEE Xplore (Online service), _edistributor. |
|
776 | 0 | 8 |
_iPrint version: _z9780780334908 |
830 | 0 |
_aIEEE Press series on network management ; _v12 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947 |
942 | _cEBK | ||
999 |
_c59447 _d59447 |