La Gestion des Identités Numériques / / sous la direction de Maryline Laurent, Samia Bouzefrane |
Pubbl/distr/stampa | London : , : ISTE Editions Ltd., , 2015 |
Descrizione fisica | 1 online resource (284 pages) |
Disciplina | 005.8 |
Collana | Systèmes d'information, web et informatique ubiquitaire |
Soggetto topico |
Computer security
Computer networks - Access control |
ISBN | 1-78406-056-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Nota di contenuto | Intro -- Table des matières -- Préface -- 1 Les identités numériques -- 2 La gestion d'identités par la fédération -- 3 Systèmes d'authentification -- 4 Gestion de la vie privée et protection des données à caractère personnel -- 5 L'identité numérique dans le Cloud computing -- Index. |
Record Nr. | UNINA-9910797062703321 |
London : , : ISTE Editions Ltd., , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
La Gestion des Identités Numériques / / sous la direction de Maryline Laurent, Samia Bouzefrane |
Pubbl/distr/stampa | London : , : ISTE Editions Ltd., , 2015 |
Descrizione fisica | 1 online resource (284 pages) |
Disciplina | 005.8 |
Collana | Systèmes d'information, web et informatique ubiquitaire |
Soggetto topico |
Computer security
Computer networks - Access control |
ISBN | 1-78406-056-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Nota di contenuto | Intro -- Table des matières -- Préface -- 1 Les identités numériques -- 2 La gestion d'identités par la fédération -- 3 Systèmes d'authentification -- 4 Gestion de la vie privée et protection des données à caractère personnel -- 5 L'identité numérique dans le Cloud computing -- Index. |
Record Nr. | UNINA-9910821658103321 |
London : , : ISTE Editions Ltd., , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (689 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ChaouchiHakima
Laurent-MaknaviciusMaryline |
Collana | ISTE |
Soggetto topico |
Wireless communication systems - Security measures
Mobile communication systems - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-69149-X
9786612691492 0-470-61188-X 0-470-61028-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks 2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions 2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols 3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction 4.3.2. Wireless intrusion detection systems architectures |
Record Nr. | UNINA-9910139512903321 |
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (689 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ChaouchiHakima
Laurent-MaknaviciusMaryline |
Collana | ISTE |
Soggetto topico |
Wireless communication systems - Security measures
Mobile communication systems - Security measures |
ISBN |
1-282-69149-X
9786612691492 0-470-61188-X 0-470-61028-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks 2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions 2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols 3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction 4.3.2. Wireless intrusion detection systems architectures |
Record Nr. | UNINA-9910830184103321 |
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (689 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ChaouchiHakima
Laurent-MaknaviciusMaryline |
Collana | ISTE |
Soggetto topico |
Wireless communication systems - Security measures
Mobile communication systems - Security measures |
ISBN |
1-282-69149-X
9786612691492 0-470-61188-X 0-470-61028-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks 2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions 2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols 3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction 4.3.2. Wireless intrusion detection systems architectures |
Record Nr. | UNINA-9910876886103321 |
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|