Secure Communications /
This reference presents a comprehensive and detailed study about Secure Communications.
Main Author: | |
---|---|
Format: | text |
Language: | eng |
Published: |
Delhi, India : World Technologies,
2012
|
Subjects: | |
Online Access: | http://repository.library.utm.my/2560 |
_version_ | 1826470261709340672 |
---|---|
author | Gomes, Jae, author 639723 |
author_facet | Gomes, Jae, author 639723 |
author_sort | Gomes, Jae, author 639723 |
collection | OCEAN |
description | This reference presents a comprehensive and detailed study about Secure Communications. |
first_indexed | 2024-03-05T16:45:35Z |
format | text |
id | KOHA-OAI-TEST:593382 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:45:35Z |
publishDate | 2012 |
publisher | Delhi, India : World Technologies, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5933822022-03-28T10:21:46ZSecure Communications / Gomes, Jae, author 639723 text Electronic books 631902 Delhi, India : World Technologies,2012©2012engThis reference presents a comprehensive and detailed study about Secure Communications.When two entities are communicating with each other, and they do not want a third party to listen to their communication, then they want to pass on their message in such a way that no body else could understand their message. This is known as communicating in a secure manner or secure communication. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no communication is guaranteed secure in this sense, although practical limitations such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication are limiting factors to surveillance.Chapter 1 - Secure Communication -- Chapter 2 - HTTP Secure -- Chapter 3 - Computer Security -- Chapter 4 - Secure Communications Interoperability Protocol and Secure -- Electronic Transaction -- Chapter 5 - Data Breach, Secure Telephone and Secure Voice -- Chapter 6 - Transport Layer Security -- Chapter 7 - Information Security -- Chapter 8 - STU-I, STU-II and STU-III -- Chapter 9 - Cryptography.This reference presents a comprehensive and detailed study about Secure Communications.When two entities are communicating with each other, and they do not want a third party to listen to their communication, then they want to pass on their message in such a way that no body else could understand their message. This is known as communicating in a secure manner or secure communication. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no communication is guaranteed secure in this sense, although practical limitations such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication are limiting factors to surveillance.PSZ_JBTelecommunicationCryptographyhttp://repository.library.utm.my/2560URN:ISBN:9788132340232Remote access restricted to users with a valid UTM ID via VPN. |
spellingShingle | Telecommunication Cryptography Gomes, Jae, author 639723 Secure Communications / |
title | Secure Communications / |
title_full | Secure Communications / |
title_fullStr | Secure Communications / |
title_full_unstemmed | Secure Communications / |
title_short | Secure Communications / |
title_sort | secure communications |
topic | Telecommunication Cryptography |
url | http://repository.library.utm.my/2560 |
work_keys_str_mv | AT gomesjaeauthor639723 securecommunications |