|
|
|
|
LEADER |
06954nam a2200817 4500 |
001 |
ocn862114228 |
003 |
OCoLC |
005 |
20170124072006.2 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
131105s2014 nju ob 001 0 eng d |
040 |
|
|
|a CDX
|b eng
|e rda
|e pn
|c CDX
|d IDEBK
|d CUS
|d DG1
|d COO
|d OCLCQ
|d YDXCP
|d N$T
|d IEEEE
|d OCLCQ
|d OCLCF
|d B24X7
|d STF
|d TEFOD
|d COD
|d OCLCQ
|d E7B
|d UKMGB
|d DEBBG
|d TEFOD
|d EBLCP
|d CNSPO
|d DEBSZ
|d GrThAP
|
016 |
7 |
|
|a 015629709
|2 Uk
|
019 |
|
|
|a 861081964
|a 868972110
|a 966353703
|
020 |
|
|
|a 9781118741580
|q (electronic bk.)
|
020 |
|
|
|a 1118741668
|q (electronic bk.)
|
020 |
|
|
|a 1118741587
|q (electronic bk.)
|
020 |
|
|
|a 9781118741665
|q (electronic bk.)
|
020 |
|
|
|a 9781118746981
|q (electronic bk.)
|
020 |
|
|
|a 1118746988
|q (electronic bk.)
|
020 |
|
|
|z 0470565136
|
020 |
|
|
|z 9780470565131
|
020 |
|
|
|z 9781306028646
|
020 |
|
|
|z 1306028647
|
029 |
1 |
|
|a AU@
|b 000052334850
|
029 |
1 |
|
|a CHBIS
|b 010131748
|
029 |
1 |
|
|a CHVBK
|b 314712267
|
029 |
1 |
|
|a NLGGC
|b 373100175
|
029 |
1 |
|
|a NZ1
|b 15340630
|
029 |
1 |
|
|a DEBBG
|b BV041905827
|
029 |
1 |
|
|a DEBBG
|b BV043396325
|
029 |
1 |
|
|a DEBSZ
|b 431542201
|
035 |
|
|
|a (OCoLC)862114228
|z (OCoLC)861081964
|z (OCoLC)868972110
|z (OCoLC)966353703
|
037 |
|
|
|a 84885734-D9C5-4069-AD8F-8670F80CDE05
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Jacobs, Stuart.
|
245 |
1 |
0 |
|a Security management of next generation telecommunications networks and services /
|c Stuart Jacobs.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b IEEE Press Wiley,
|c [2014]
|
300 |
|
|
|a 1 online resource (xvi, 373 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IEEE Press series on networks and services management
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (Wiley, viewed November 8, 2013).
|
520 |
|
|
|a "This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information."--
|c Unedited summary from book.
|
505 |
0 |
|
|a SECURITYMANAGEMENTOF NEXT GENERATIONTELECOMMUNICATIONSNETWORKS ANDSERVICES; Copyright; Contents; Preface; Acknowledgments; 1 INTRODUCTION; 1.1 EVOLUTION OF NETWORKING CONCEPTS; 1.1.1 The Public Switched Telephone Network; 1.1.2 Computer/Data Communications Networks; 1.1.3 Network Architectures; 1.1.4 Data Network Complexity; 1.2 A NETWORK SECURITY HISTORICAL PERSPECTIVE; 1.2.1 ISO/IEC 7498-1 (ITU -T X.200) Coverage of Management; 1.2.2 ISO/IEC 7498-4 (ITU -T X.700) Coverage of Security Management; 1.2.3 ISO/IEC 7498-2 (ITU -T X.800) Coverage of Security and Management.
|
505 |
8 |
|
|a 1.2.4 The Security Frameworks (ITU -T X.810- ITU -T X.816)1.2.5 The ITU -T X.805 Approach to Security; 1.3 NETWORK AND SECURITY MANAGEMENT SYSTEMS; 1.3.1 Element and Network Management Systems; 1.3.2 Operations Support Systems; 1.4 EVOLUTION OF NETWORK AND SECURITY MANAGEMENT CONCEPTS; 1.4.1 Telecommunications Management Network; 1.4.2 Next Generation Operations Systems and Software; 1.4.3 Enhanced Telecom Operations Map; 1.5 HOW THE NEED FOR INFORMATION SECURITY HAS CHANGED; 1.6 SUMMARY; FURTHER READING AND RESOURCES; 2 OVERVIEW OF CURRENT AND FUTURE NETWORKS; 2.1 A LITTLE NETWORK HISTORY.
|
505 |
8 |
|
|a 2.1.1 Point-to-Point Data Communications2.1.2 Early Commercial Packet Switching; 2.1.3 The ARPANET: Internet; 2.1.4 Ethernet and IEEE 802.3; 2.1.5 Network Address Translation; 2.2 COMMON NETWORK ORGANIZATIONS; 2.2.1 Wired Local Area Networks; 2.2.2 Wireless Networks; 2.2.3 Metropolitan Area Networks; 2.2.4 Wide Area Networks; 2.2.5 Networks Are Now Layered upon Networks; 2.2.6 Additional Networking Developments; 2.2.7 Security Mechanisms in Modern Networks; 2.3 NEXT-GENERATION NETWORKS AND INTERFACES; 2.3.1 Framework and Topology of the NGN; 2.3.2 IP Multimedia Subsystem; 2.4 SUMMARY.
|
505 |
8 |
|
|a FURTHER READING AND RESOURCES3 SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS; 3.1 CYBERCRIME AS A DRIVER FOR INFORMATION SECURITY MANAGEMENT; 3.2 GOVERNANCE AS A DRIVER FOR INFORMATION SECURITY MANAGEMENT; 3.2.1 What Is Governance?; 3.2.2 Information System Security Governance; 3.3 INFORMATION SECURITY MANAGEMENT FRAMEWORKS; 3.3.1 ISO/IEC 27000 Series; 3.3.2 The Information Technology Infrastructure Library Framework; 3.3.3 COBIT Framework; 3.3.4 FISMA Framework; 3.4 A HOLISTIC APPROACH FOR SECURITY MANAGEMENT; 3.4.1 Organizational Aspects of Security Governance and Management.
|
505 |
8 |
|
|a 3.4.2 Policies and Policy Hierarchies3.4.3 Functional and Operational Security Requirements; 3.5 SUMMARY; FURTHER READING AND RESOURCES; 4 RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS; 4.1 ASSET IDENTIFICATION: DEFINITION AND INVENTORYING; 4.2 IMPACT ANALYSIS; 4.2.1 Existing System Impact Analysis; 4.2.2 New System Impact Analysis; 4.2.3 Risk Mitigation Analysis; 4.2.4 Malicious Security Events and Threat Assessment; 4.3 RISK MITIGATION CONTROLS ACQUISITION OR DEVELOPMENT; 4.3.1 Procedural Risk Mitigation Controls; 4.3.2 New Technical Risk Mitigation Controls.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
4 |
|a Computer networks
|x Security measures.
|
650 |
|
4 |
|a Computer security
|x Management.
|
650 |
|
4 |
|a Computer security.
|
650 |
|
4 |
|a COMPUTERS
|x Networking
|x Security.
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Jacobs, Stuart.
|t Security management of next generation telecommunications networks and services.
|d Hoboken, New Jersey : Wiley, c2014
|h xv, 373 pages
|k IEEE Press Series on Networks and Services Management
|z 9780470565131
|w 2013011611
|
830 |
|
0 |
|a IEEE Press series on networks and services management.
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118741580
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|