000 05730nam a2201189 i 4500
001 5263947
003 IEEE
005 20220712205642.0
006 m o d
007 cr |n|||||||||
008 151221s1999 nyua ob 001 eng d
020 _a9780470546390
_qelectronic
020 _z9780780334908
_qprint
020 _z0470546395
_qelectronic
024 7 _a10.1109/9780470546390
_2doi
035 _a(CaBNVSL)mat05263947
035 _a(IDAMS)0b000064810c3d84
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK5102.85
_b.R69 2000eb
082 0 4 _a621.382
_222
100 1 _aRozenblit, Moshe,
_d1944-
_926777
245 1 0 _aSecurity for telecommunications network management /
_cMoshe Rozenblit.
264 1 _aNew York :
_bIEEE Press,
_cc2000.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[1999]
300 _a1 PDF (xxiii, 296 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE Press series on network management ;
_v12
504 _aIncludes bibliographical references (p. 279-283) and index.
505 0 _aPreface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _a"Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments.".
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/21/2015.
650 0 _aTelecommunication
_xSecurity measures.
_926778
650 0 _aComputer networks
_xSecurity measures.
_93969
655 0 _aElectronic books.
_93294
695 _aAccess control
695 _aArrays
695 _aAuthentication
695 _aAuthorization
695 _aBibliographies
695 _aBiographies
695 _aBooks
695 _aBusiness
695 _aCatalogs
695 _aCertification
695 _aClocks
695 _aCommunication channels
695 _aCommunication networks
695 _aCommunications technology
695 _aComputer crime
695 _aContext
695 _aCustomer service
695 _aData models
695 _aDigital signatures
695 _aEncryption
695 _aEngines
695 _aFires
695 _aFloods
695 _aGuidelines
695 _aHistory
695 _aIP networks
695 _aIndexes
695 _aIndustries
695 _aInformation architecture
695 _aLaw
695 _aLayout
695 _aManuals
695 _aMediation
695 _aMonitoring
695 _aObject recognition
695 _aOpen systems
695 _aOrganizations
695 _aPROM
695 _aPattern analysis
695 _aPrivacy
695 _aProtocols
695 _aPublic key
695 _aReceivers
695 _aResistance
695 _aSONET
695 _aSections
695 _aSecurity
695 _aServers
695 _aSoftware
695 _aStandards
695 _aSurveillance
695 _aSyntactics
695 _aTelecommunication network management
695 _aTelecommunications
695 _aTerminology
695 _aTutorials
710 2 _aJohn Wiley & Sons,
_epublisher.
_96902
710 2 _aIEEE Xplore (Online service),
_edistributor.
_926779
776 0 8 _iPrint version:
_z9780780334908
830 0 _aIEEE Press series on network management ;
_v12
_926780
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947
942 _cEBK
999 _c73875
_d73875