Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.
With the advent of telecommunication and IT technologies coupled with the increasingly dominant roles played by e-commerce in every major industry, the development and implementation efforts in many areas of network security have drawn technologies from more and more seemingly unrelated technical fields that did not previously have to cross path or intimately interwork. These major technical fields include cryptography, network protocols, switch/router technology and information technology, each with already fully developed theories, standards as well as well-established practices. Trying to develop expertise in all of these technical fields is a challenging task. By introducing a unique, hierarchical framework based on the fundamental network security functional elements of confidentiality, authentication, authorization, message integrity and non-repudiation, this book presents the key network security-relevant technologies in these diverse fields in an organized, easy-to-follow fashion which greatly facilitates the understanding of not only the technologies themselves but also their inter-relationships and how they interwork.
ABOUT THE AUTHORKwok T. Fung worked for AT&T Bell Laboratories/AT&T Laboratories in data networking and telecommunications for more than 20 years. He also taught computer science for a number of years at the University of Windsor, Ontario, Canada. He coauthored the book Computer Design and Implementation by Computer Science Press and has several papers published in technical journals and conference proceedings. He has also coauthored several patent applications. He received his M.S. and Ph.D. degrees in computer engineering from Cornell University and his B.S. in electrical engineering from the University of Manitoba, Canada.