Security for telecommunications network management / (Record no. 59447)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05683nam a2201189 i 4500 |
001 - CONTROL NUMBER | |
control field | 5263947 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421114113.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151221s1999 nyua ob 001 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780470546390 |
-- | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.382 |
100 1# - AUTHOR NAME | |
Author | Rozenblit, Moshe, |
245 10 - TITLE STATEMENT | |
Title | Security for telecommunications network management / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF (xxiii, 296 pages) : |
490 1# - SERIES STATEMENT | |
Series statement | IEEE Press series on network management ; |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Preface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments.". |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | New York : |
-- | IEEE Press, |
-- | c2000. |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [1999] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | Description based on PDF viewed 12/21/2015. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
695 ## - | |
-- | Access control |
695 ## - | |
-- | Arrays |
695 ## - | |
-- | Authentication |
695 ## - | |
-- | Authorization |
695 ## - | |
-- | Bibliographies |
695 ## - | |
-- | Biographies |
695 ## - | |
-- | Books |
695 ## - | |
-- | Business |
695 ## - | |
-- | Catalogs |
695 ## - | |
-- | Certification |
695 ## - | |
-- | Clocks |
695 ## - | |
-- | Communication channels |
695 ## - | |
-- | Communication networks |
695 ## - | |
-- | Communications technology |
695 ## - | |
-- | Computer crime |
695 ## - | |
-- | Context |
695 ## - | |
-- | Customer service |
695 ## - | |
-- | Data models |
695 ## - | |
-- | Digital signatures |
695 ## - | |
-- | Encryption |
695 ## - | |
-- | Engines |
695 ## - | |
-- | Fires |
695 ## - | |
-- | Floods |
695 ## - | |
-- | Guidelines |
695 ## - | |
-- | History |
695 ## - | |
-- | IP networks |
695 ## - | |
-- | Indexes |
695 ## - | |
-- | Industries |
695 ## - | |
-- | Information architecture |
695 ## - | |
-- | Law |
695 ## - | |
-- | Layout |
695 ## - | |
-- | Manuals |
695 ## - | |
-- | Mediation |
695 ## - | |
-- | Monitoring |
695 ## - | |
-- | Object recognition |
695 ## - | |
-- | Open systems |
695 ## - | |
-- | Organizations |
695 ## - | |
-- | PROM |
695 ## - | |
-- | Pattern analysis |
695 ## - | |
-- | Privacy |
695 ## - | |
-- | Protocols |
695 ## - | |
-- | Public key |
695 ## - | |
-- | Receivers |
695 ## - | |
-- | Resistance |
695 ## - | |
-- | SONET |
695 ## - | |
-- | Sections |
695 ## - | |
-- | Security |
695 ## - | |
-- | Servers |
695 ## - | |
-- | Software |
695 ## - | |
-- | Standards |
695 ## - | |
-- | Surveillance |
695 ## - | |
-- | Syntactics |
695 ## - | |
-- | Telecommunication network management |
695 ## - | |
-- | Telecommunications |
695 ## - | |
-- | Terminology |
695 ## - | |
-- | Tutorials |
No items available.