From the book lists at Adware Report:

All information current as of 19:15:33 Pacific Time, Monday, 21 February 2005.

Internet and Wireless Security

   by R. Temple / J. Regnault

  Hardcover:
    Institution of Electrical Engineers
    22 April, 2002

   US$89.00 

   Usually ships in 24 hours

Click the button below to . . .

    
(which will add the book to your Amazon U.S.A. "Shopping Cart")

. . . or use your browser's Back button to return to the search-list page.

Editorial description(s):

From Book News, Inc.
As computer security experts with BTexact Technologies, UK, Temple and Renault broach not only technical aspects of the Internet's future covered by these 16 contributed chapters but also the pivotal issue of user trust. In the preface, a colleague of theirs contends that concerns about computer security are impeding wider adoption of electronic commerce by businesses and consumers. Given that people remain the weakest link in human-computer interactions, contributors expand upon the theme of trust via an "iTrust" integrated architecture program, public key cryptology infrastructures (for wired and wireless environments), biometrics, and other approaches to information assurance. The last chapter overviews the latest security management standard and its policy, technical, and commercial implications.Copyright © 2004 Book News, Inc., Portland, OR



Software World
"A valuable contribution to the understanding of security from BTexact Technologies."



About the Author
Robert Temple is the Chief Security Architect for BTexact Technologies. He is responsible for business development of BTexact's security competence and for reviewing and assessing new security technologies.

John Regnault is Head of Security Solutions for BTexact Technologies. He has worked for BT for 30 years, specializing in research and development on a wide range of communications technologies.



Book Description
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses.





Reader review(s):

(none available)


{end of page}

(Page code from the SEO Tools, Toys, and Packages site)