AAA and Network Security for Mobile Access et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 98,69
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
AAA and Network Security ... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility (Anglais) Relié – 9 septembre 2005

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 98,69
EUR 98,69 EUR 95,66

Offres spéciales et liens associés

Descriptions du produit

Revue de presse

" serves to provide planners and researchers in both academic and professional capacities a way in which to completely access pertinent data in a logical and clearly defined manner." ( Electric Review, September/October 2006)

Présentation de l'éditeur

AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius.  The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations.

AAA and Network Security for Mobile Access:

  • Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment.
  • Discusses public key infrastructures and provides practical tips on certificates management.
  • Introduces Diameter, a state–of–the–art AAA protocol designed to meet today s reliability, security and robustness requirements, and examines Diameter–Mobile IP interactions.
  • Explains RADIUS (Remote Authentication Dial–In User Services) and its latest extensions.
  • Details EAP (Extensible Authentication Protocol) in–depth, giving a protocol overview, and covering EAP–XXX authentication methods as well as use of EAP in 802 networks.
  • Describes IP mobility protocols including IP level mobility management, its security and optimizations, and latest IETF seamless mobility protocols.
  • Includes a chapter describing the details of Mobile IP and AAA interaction, illustrating Diameter Mobile IP applications and the process used in CDMA2000.
  • Contains a section on security and AAA issues to support roaming, discussing a variety of options for operator co–existence, including an overview of Liberty Alliance.

This text will provide researchers in academia and industry, network security engineers, managers, developers and planners, as well as graduate students, with an accessible explanation of the standards fundamental to secure mobile access.

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Première phrase
For the road travelers in the United States, especially the parents who take their children in the family car on the long road trips, the letters AAA stand for a peace of mind. Lire la première page
En découvrir plus
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur (beta) 4 commentaires
6 internautes sur 6 ont trouvé ce commentaire utile 
Expensive, but worth it. 18 mai 2006
Par Alan Brown - Publié sur
Format: Relié
If you're looking for an in depth book on AAA and it's associated algorithms, there's no match for this book. Much as I wish I was wrong and that I could replace the book I borrowed from my friend with a cheaper book, I'm afraid I'm about to be forced to shell out the [...] on AAA. And I'm only going to need it as an intermittent reference. There's no math (at least no Greek), but many of the algorithms used to underpin the subject are explained concisely and clearly. It's simply well written and more informative than anything else on the market. I'm a sales engineer and this book was written on the ideal level for me. Technical enough but also abstract enough. Good work sir!
3 internautes sur 3 ont trouvé ce commentaire utile 
AAA and Network Security 22 août 2009
Par Malcolm W. Oliphant - Publié sur
Format: Relié Achat vérifié
Though a thorough treatment of all the relevant aspects of the advertised elements of network security, the English is bad enough to be ambiguous and distracting and many places. A recommended work if the reader is prepared to be patient and diligent with the awkward use of the English language.
5 internautes sur 7 ont trouvé ce commentaire utile 
Keeping Wireless Communications Secure 22 mars 2006
Par John Matlock - Publié sur
Format: Relié
This 'Triple A' set stands for Authentication, Authorization, Accounting, and the theme of this book is maintaining security in a wireless cell-phone network.

Authentication is a three way street. Is the device being used really the correct device to receive the service being requested? And is the network being accessed really the network you want to be on? The third type of authentication is on a message level. Is the message itself legit, or did someone, somehow get in the middle and send a bogus message?

Authorization is rather like the old 'need to know' aspect of security. Is the salesman out in the field that's calling in really authorized to get employee or financial information?

Accounting includes making sure that the client is billed the correct amount of time, but also includes such things as system usage analysis to help define capacity planning.

Each of these subjects is exhaustively treated in this book. Further they are handled with a casual writing style that makes the book more enjoyable to read than most. Well, maybe enjoyable isn't exactly the right word -- how about making it possible to get through it without falling asleep.
An essential guide to DIAMETER 2 mai 2012
Par I. Zilbershtein - Publié sur
Format: Format Kindle Achat vérifié
This is a must read for anyone who wish to gain a greater understanding of DIAMETER, making sense of the set of RFCs that define it and its applications.
I wish this subject had been covered in greater details, with possibly greater attention given to applications & usage in IMS networks, which is in practice where DIAMETER is often found.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?