Normal view MARC view ISBD view

Security for telecommunications network management / Moshe Rozenblit.

By: Rozenblit, Moshe, 1944-.
Contributor(s): John Wiley & Sons [publisher.] | IEEE Xplore (Online service) [distributor.].
Material type: materialTypeLabelBookSeries: IEEE Press series on network management: 12Publisher: New York : IEEE Press, c2000Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [1999]Description: 1 PDF (xxiii, 296 pages) : illustrations.Content type: text Media type: electronic Carrier type: online resourceISBN: 9780470546390.Subject(s): Telecommunication -- Security measures | Computer networks -- Security measures | Access control | Arrays | Authentication | Authorization | Bibliographies | Biographies | Books | Business | Catalogs | Certification | Clocks | Communication channels | Communication networks | Communications technology | Computer crime | Context | Customer service | Data models | Digital signatures | Encryption | Engines | Fires | Floods | Guidelines | History | IP networks | Indexes | Industries | Information architecture | Law | Layout | Manuals | Mediation | Monitoring | Object recognition | Open systems | Organizations | PROM | Pattern analysis | Privacy | Protocols | Public key | Receivers | Resistance | SONET | Sections | Security | Servers | Software | Standards | Surveillance | Syntactics | Telecommunication network management | Telecommunications | Terminology | TutorialsGenre/Form: Electronic books.Additional physical formats: Print version:: No titleDDC classification: 621.382 Online resources: Abstract with links to resource Also available in print.
Contents:
Preface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author.
Summary: "Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments.".
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references (p. 279-283) and index.

Preface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author.

Restricted to subscribers or individual electronic text purchasers.

"Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments.".

Also available in print.

Mode of access: World Wide Web

Description based on PDF viewed 12/21/2015.

There are no comments for this item.

Log in to your account to post a comment.