Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.
This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.
"synopsis" may belong to another edition of this title.
Robert Temple is the chief security architect for BTexact Technologies. He is responsible for business development of BTexact's core security competence and for reviewing and assessing new security technologies. He has worked for BT for 16 years in the systems development field, concentrating on IT security and, most recently, on commercial deployment of PKI. Prior to his current role, Temple was head of group security policy and also head of the IT security unit. He is a member of the Steering Group of the European Electronic Signature Standardisation Initiative, the BCS, the Information Security Committee and the Association for Computing Machinery.
John Regnault is head of security solutions for BTexact Technologies. He has worked for BT for 30 years, specialising in research and development on a wide range of communications technologies, and has published 35 technical papers. During the past eight years Regnault has developed and expanded the scope of BT's security research team. His team of 25 security specialists is now responsible for consulting on new security issues resulting from advances in technology across the BT group. This team covers a wide range of application areas including encryption, PKIs and secure network communications.
"About this title" may belong to another edition of this title.
£ 2.74 shipping within United Kingdom
Destination, rates & speedsFREE shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: Phatpocket Limited, Waltham Abbey, HERTS, United Kingdom
Condition: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Seller Inventory # Z1-F-062-00982
Quantity: 1 available
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEJUNE24-137445
Quantity: 4 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-205258
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. xvi + 285 Illus. Seller Inventory # 7360494
Quantity: 1 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. xvi + 285 Index. Seller Inventory # 26520241
Quantity: 1 available
Seller: Rarewaves USA United, OSWEGO, IL, U.S.A.
Hardback. Condition: New. Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security. Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems. Seller Inventory # LU-9780852961971
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 597. Seller Inventory # C9780852961971
Quantity: Over 20 available
Seller: moluna, Greven, Germany
Gebunden. Condition: New. Inhaltsverzeichnisrnrnn Chapter 1: Building on Rock Rather Than Sandn Chapter 2: XML and Securityn Chapter 3: Using XML Security Mechanismsn Chapter 4: Security Modelling Languagen Chapter 5: Public Ke. Seller Inventory # 447094242
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. illustrated edition. 304 pages. 9.25x6.25x0.75 inches. In Stock. Seller Inventory # x-0852961979
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. Neuware - Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses. Seller Inventory # 9780852961971
Quantity: 2 available