Internet and Intranet Security

A book published by Artech House Publishers

[Book Cover]

Author


Rolf Oppliger, Ph.D.
eSECURITY Technologies Rolf Oppliger
Breichtenstrasse 18
CH-3074 Muri b. Bern, Switzerland

E-Mail: rolf.oppliger@esecurity.ch
Phone/Fax: +41 079 654 84 37

Aims and Scope

When I started to work on Internet and intranet security a couple of years ago, the situation was comparably simple. There were some authentication and key distribution systems available that made people believe the Internet would become secure if only these systems were used and widely deployed (e.g., Kerberos). It was at this time I wrote Authentication Systems for Secure Networks, a companion book also published by Artech House. But after having written the book, I realized that alternative techniques and mechanisms had been developed to provide Internet and intranet security. For example, firewalls started their triumphal march that has continued until today. Also, cryptographic security protocols for the Internet, transport, and application layer had been developed, proposed, and partly implemented. Consequently, I realized that the use of authentication systems is just one possibility to address Internet security, and that there are other possibilities as well. In this situation, I decided to write Internet and Intranet Security to give a more comprehensive overview about currently available security techniques and mechanisms for TCP/IP-based networks.

Target Audience

The book has been written to serve the needs of computer and network professionals that have interest in understanding, establishing, and supporting secure TCP/IP-based networks. I also hope that the book provides sufficient background to help security professionals propose approaches to secure commercial applications for the Internet. The book is tutorial in nature but still requires some familiarity with the fundamentals of computer networks and distributed systems, as well as cryptography and the use of cryptographic protocols in networked and distributed environments.

Table of Contents

Part I: FUNDAMENTALS

1. Introduction
2. TCP/IP Networking
3. OSI Security Architecture
4. Cryptographic Techniques

Part II: ACCESS CONTROL

5. Overview
6. Packet Filters
7. Application Gateways
8. Firewall Configurations

Part III: COMMUNICATION SECURITY

9. Internet Layer Security Protocols
10. Transport Layer Security Protocols
11. Application Layer Security Protocols
12. Conclusions

Part IV: DISCUSSION

13. Electronic Commerce
14. Security Tools
15. Epilog

Glossary
Abbreviations and Acronyms
About the Author
Index

Errata List

Reviews

The following people have reviewed the book:

News


Copyright © 2002 Rolf Oppliger