Security for telecommunications network management / (Record no. 59447)

000 -LEADER
fixed length control field 05683nam a2201189 i 4500
001 - CONTROL NUMBER
control field 5263947
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421114113.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s1999 nyua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780470546390
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Rozenblit, Moshe,
245 10 - TITLE STATEMENT
Title Security for telecommunications network management /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (xxiii, 296 pages) :
490 1# - SERIES STATEMENT
Series statement IEEE Press series on network management ;
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author.
520 ## - SUMMARY, ETC.
Summary, etc "Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments.".
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- New York :
-- IEEE Press,
-- c2000.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [1999]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
695 ## -
-- Access control
695 ## -
-- Arrays
695 ## -
-- Authentication
695 ## -
-- Authorization
695 ## -
-- Bibliographies
695 ## -
-- Biographies
695 ## -
-- Books
695 ## -
-- Business
695 ## -
-- Catalogs
695 ## -
-- Certification
695 ## -
-- Clocks
695 ## -
-- Communication channels
695 ## -
-- Communication networks
695 ## -
-- Communications technology
695 ## -
-- Computer crime
695 ## -
-- Context
695 ## -
-- Customer service
695 ## -
-- Data models
695 ## -
-- Digital signatures
695 ## -
-- Encryption
695 ## -
-- Engines
695 ## -
-- Fires
695 ## -
-- Floods
695 ## -
-- Guidelines
695 ## -
-- History
695 ## -
-- IP networks
695 ## -
-- Indexes
695 ## -
-- Industries
695 ## -
-- Information architecture
695 ## -
-- Law
695 ## -
-- Layout
695 ## -
-- Manuals
695 ## -
-- Mediation
695 ## -
-- Monitoring
695 ## -
-- Object recognition
695 ## -
-- Open systems
695 ## -
-- Organizations
695 ## -
-- PROM
695 ## -
-- Pattern analysis
695 ## -
-- Privacy
695 ## -
-- Protocols
695 ## -
-- Public key
695 ## -
-- Receivers
695 ## -
-- Resistance
695 ## -
-- SONET
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Servers
695 ## -
-- Software
695 ## -
-- Standards
695 ## -
-- Surveillance
695 ## -
-- Syntactics
695 ## -
-- Telecommunication network management
695 ## -
-- Telecommunications
695 ## -
-- Terminology
695 ## -
-- Tutorials

No items available.