Description

Book Synopsis
This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their technical aspects and their security risks. Readers will also find solutions to the problems facing the security systems designer, buyer, or manager.

Trade Review
"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)

Table of Contents
Preface

Acknowledgement

Glossary

Acronyms and Abbreviations

1. Threats and Solutions

The Technical Threats to Communications Security

Authentication

Confidentiality

Integrity

Availability

Compromising Emanation/Tempest Threats

2. An Introduction to Encryption and Security Management

Analogue Scrambling

Algorithms

Goodbye DES, Hello DES

Fundamentals in Key Management

Evaluating Encryption Equipment

3. Voice Security in Military Applications

Analogue Encryption of Naval Long range, HF Radio Communications

Stand-alone Digital Cipher Units in Land-based Operations

Radio Integrated Cipher Module

4. Telephone Security

Specific Threats to Telephone Operations

Network Technologies

Telephone Security Solutions

Key and Access Management

Network Implementation

Key Distribution

Summary

5. Secure GSM Systems

The Basic GSM Architecture

Standard GSM Secuirty Features

Custom Security for GSM Users

Key Management and Tools

GRPS General Packet Radio Systems

6. Security in Private VHF/UHF Radio Networks

Applications and Features

Threats

Countermeasures

Communications Network Design and Architecture

Hardware Components and Functions

Security and Key Management

Other Security Features

7. Electronic Protection Measures -
Frequency Hopping

Electronic Warfare (EW)

Electronic Protection Measures (EPM)

Military Applications

Network Architecture and Management

Characteristics of Frequency Hopping Networks

Key/Data Management and Tools

Hardware components

8. Link and Bulk Encryption

Basic Technology of Link Encryption

The Ciphering Process

Cryptographic Parameters

Key and Network Management

Military Link Security

9. Secure Fax Networks

Basic Facsimile Technology

Manual/Automatic Key Selection

Network Architecture

Key Management and Tools

Fax Over Satellite Links

10. PC Security

Security Threats and Risks

Implementation of Solutions

Access Protection

Boot-up Protection by On-Board Hardware with Smart Card

LAN Security

Model Application of PC Security

System Administration

11. Secure E-mail

The E-mail Scenario

Threats

Type and Motivation of Attackers

Methods of Attack

Countermeasures

Guidelines for E-mail Security

12. Secure Virtual Private Networks

Scenario

Definition VPN

Protocols

Packet Header Formats

Security Association List

Tunnel Table

Routing Tables

Packet Filtering

Threats and Countermeasures

Attacks within the Public Network

13. Military Data Communication

Applications

Data Terminals and their Operating Features

Technical Parameters

Security Management

Key Management

Combat Packet Data Networks

14. Managment, Support and Training

Environments of Security Management

Infrastructure and Planning

Operational Hierarchies

Training

Customer Support

Troubleshooting

References

Index

Secure Communications

Product form

£117.85

Includes FREE delivery

RRP £130.95 – you save £13.10 (10%)

Order before 4pm tomorrow for delivery by Mon 22 Dec 2025.

A Hardback by Roger J. Sutton

15 in stock


    View other formats and editions of Secure Communications by Roger J. Sutton

    Publisher: John Wiley & Sons Inc
    Publication Date: 27/12/2001
    ISBN13: 9780471499046, 978-0471499046
    ISBN10: 0471499048

    Description

    Book Synopsis
    This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their technical aspects and their security risks. Readers will also find solutions to the problems facing the security systems designer, buyer, or manager.

    Trade Review
    "...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)

    Table of Contents
    Preface

    Acknowledgement

    Glossary

    Acronyms and Abbreviations

    1. Threats and Solutions

    The Technical Threats to Communications Security

    Authentication

    Confidentiality

    Integrity

    Availability

    Compromising Emanation/Tempest Threats

    2. An Introduction to Encryption and Security Management

    Analogue Scrambling

    Algorithms

    Goodbye DES, Hello DES

    Fundamentals in Key Management

    Evaluating Encryption Equipment

    3. Voice Security in Military Applications

    Analogue Encryption of Naval Long range, HF Radio Communications

    Stand-alone Digital Cipher Units in Land-based Operations

    Radio Integrated Cipher Module

    4. Telephone Security

    Specific Threats to Telephone Operations

    Network Technologies

    Telephone Security Solutions

    Key and Access Management

    Network Implementation

    Key Distribution

    Summary

    5. Secure GSM Systems

    The Basic GSM Architecture

    Standard GSM Secuirty Features

    Custom Security for GSM Users

    Key Management and Tools

    GRPS General Packet Radio Systems

    6. Security in Private VHF/UHF Radio Networks

    Applications and Features

    Threats

    Countermeasures

    Communications Network Design and Architecture

    Hardware Components and Functions

    Security and Key Management

    Other Security Features

    7. Electronic Protection Measures -
    Frequency Hopping

    Electronic Warfare (EW)

    Electronic Protection Measures (EPM)

    Military Applications

    Network Architecture and Management

    Characteristics of Frequency Hopping Networks

    Key/Data Management and Tools

    Hardware components

    8. Link and Bulk Encryption

    Basic Technology of Link Encryption

    The Ciphering Process

    Cryptographic Parameters

    Key and Network Management

    Military Link Security

    9. Secure Fax Networks

    Basic Facsimile Technology

    Manual/Automatic Key Selection

    Network Architecture

    Key Management and Tools

    Fax Over Satellite Links

    10. PC Security

    Security Threats and Risks

    Implementation of Solutions

    Access Protection

    Boot-up Protection by On-Board Hardware with Smart Card

    LAN Security

    Model Application of PC Security

    System Administration

    11. Secure E-mail

    The E-mail Scenario

    Threats

    Type and Motivation of Attackers

    Methods of Attack

    Countermeasures

    Guidelines for E-mail Security

    12. Secure Virtual Private Networks

    Scenario

    Definition VPN

    Protocols

    Packet Header Formats

    Security Association List

    Tunnel Table

    Routing Tables

    Packet Filtering

    Threats and Countermeasures

    Attacks within the Public Network

    13. Military Data Communication

    Applications

    Data Terminals and their Operating Features

    Technical Parameters

    Security Management

    Key Management

    Combat Packet Data Networks

    14. Managment, Support and Training

    Environments of Security Management

    Infrastructure and Planning

    Operational Hierarchies

    Training

    Customer Support

    Troubleshooting

    References

    Index

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account