Secure Communications /

This reference presents a comprehensive and detailed study about Secure Communications.

Bibliographic Details
Main Author: Gomes, Jae, author 639723
Format: text
Language:eng
Published: Delhi, India : World Technologies, 2012
Subjects:
Online Access:http://repository.library.utm.my/2560
_version_ 1826470261709340672
author Gomes, Jae, author 639723
author_facet Gomes, Jae, author 639723
author_sort Gomes, Jae, author 639723
collection OCEAN
description This reference presents a comprehensive and detailed study about Secure Communications.
first_indexed 2024-03-05T16:45:35Z
format text
id KOHA-OAI-TEST:593382
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:45:35Z
publishDate 2012
publisher Delhi, India : World Technologies,
record_format dspace
spelling KOHA-OAI-TEST:5933822022-03-28T10:21:46ZSecure Communications / Gomes, Jae, author 639723 text Electronic books 631902 Delhi, India : World Technologies,2012©2012engThis reference presents a comprehensive and detailed study about Secure Communications.When two entities are communicating with each other, and they do not want a third party to listen to their communication, then they want to pass on their message in such a way that no body else could understand their message. This is known as communicating in a secure manner or secure communication. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no communication is guaranteed secure in this sense, although practical limitations such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication are limiting factors to surveillance.Chapter 1 - Secure Communication -- Chapter 2 - HTTP Secure -- Chapter 3 - Computer Security -- Chapter 4 - Secure Communications Interoperability Protocol and Secure -- Electronic Transaction -- Chapter 5 - Data Breach, Secure Telephone and Secure Voice -- Chapter 6 - Transport Layer Security -- Chapter 7 - Information Security -- Chapter 8 - STU-I, STU-II and STU-III -- Chapter 9 - Cryptography.This reference presents a comprehensive and detailed study about Secure Communications.When two entities are communicating with each other, and they do not want a third party to listen to their communication, then they want to pass on their message in such a way that no body else could understand their message. This is known as communicating in a secure manner or secure communication. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no communication is guaranteed secure in this sense, although practical limitations such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication are limiting factors to surveillance.PSZ_JBTelecommunicationCryptographyhttp://repository.library.utm.my/2560URN:ISBN:9788132340232Remote access restricted to users with a valid UTM ID via VPN.
spellingShingle Telecommunication
Cryptography
Gomes, Jae, author 639723
Secure Communications /
title Secure Communications /
title_full Secure Communications /
title_fullStr Secure Communications /
title_full_unstemmed Secure Communications /
title_short Secure Communications /
title_sort secure communications
topic Telecommunication
Cryptography
url http://repository.library.utm.my/2560
work_keys_str_mv AT gomesjaeauthor639723 securecommunications