E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
Mohammad S. Obaidat received his PhD in Computer Engineering from The Ohio State University, Columbus, Ohio. He is currently a professor of Computer Science at Monmouth University, New Jersey, where his research interests include security of network, computer and information systems; security of E-based systems; and wireless networks and communications. An accomplished writer, he has also been editor of numerous scientific journals over the years. Noureddine A. Boudriga received his PhD in Mathematics from the University Paris XI, France and in Computer Science from the University Tunis II, Tunisia. He is currently based at The University of 7th November at Carthage in Tunisia, where he is a professor of Telecommunications at the School of Communication Engineering, and Director of the Research Laboratory on Networks and Security. His research interests include network security, risk analysis and high-speed communication networks.
Part I. E-Security: 1. Introduction to e-security; 2. Public key cryptosystems; 3. Authentication and digital signature; Part II. E-security Tools: 4. Public key infrastructure (PKI) systems; 5. Biometric-based security systems; 6. Trust management systems in communication networks; Part III. E-Security Applications: 7. e-services security; 8. e-government security; 9. e-commerce security; 10. Wireless LANs security; Part IV. Protecting Enterprises: 11. Intrusion detection systems; 12. Virtual private networks; 13. Protecting against malware; 14. Computer and network security risk management; Index.