Talks about installing and configuring a firewall. This book also helps you learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs).[...]
Offers coverage of security theory, technology, and practice as they relate to established technologies as well as advancements. This title explores practical solutions to a range of security issues. It includes analysis and problem-solving techniques that enhance the reader's grasp of the material [...]
Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-ph[...]
It is forecasted that cellular systems using digital technology will become the universal method of telecommunications. This book describes and explains the rapid advances in Global System for Mobil Communication (GSM). It provides coverage of the basics of GSM, as well as an introduction to advance[...]
Discusses advances in biometric verification/authentication, identification and system design principles. This book provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; and, how to create detailed menus for [...]
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this[...]