Skip to content
Register Sign in Wishlist

Security of e-Systems and Computer Networks

CAD$142.95 (P)

  • Date Published: June 2007
  • availability: In stock
  • format: Hardback
  • isbn: 9780521837644

CAD$ 142.95 (P)

Add to cart Add to wishlist

Other available formats:

Looking for an examination copy?

This title is not currently available for examination. However, if you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact providing details of the course you are teaching.

Product filter button
About the Authors
  • E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

    • Technically oriented with many practical examples
    • Describes the most recent technologies such as trust management systems, risk management, and biometrics-based security
    • Discusses applications in real e-based systems such as e-commerce, e-service and e-government systems
    Read more

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: June 2007
    • format: Hardback
    • isbn: 9780521837644
    • length: 386 pages
    • dimensions: 255 x 182 x 24 mm
    • weight: 0.904kg
    • contains: 43 b/w illus.
    • availability: In stock
  • Table of Contents

    Part I. E-Security:
    1. Introduction to e-security
    2. Public key cryptosystems
    3. Authentication and digital signature
    Part II. E-security Tools:
    4. Public key infrastructure (PKI) systems
    5. Biometric-based security systems
    6. Trust management systems in communication networks
    Part III. E-Security Applications:
    7. e-services security
    8. e-government security
    9. e-commerce security
    10. Wireless LANs security
    Part IV. Protecting Enterprises:
    11. Intrusion detection systems
    12. Virtual private networks
    13. Protecting against malware
    14. Computer and network security risk management

  • Authors

    Mohammad Obaidat, Monmouth University, New Jersey
    Mohammad S. Obaidat received his PhD in Computer Engineering from The Ohio State University, Columbus, Ohio. He is currently a professor of Computer Science at Monmouth University, New Jersey, where his research interests include security of network, computer and information systems; security of E-based systems; and wireless networks and communications. An accomplished writer, he has also been editor of numerous scientific journals over the years.

    Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
    Noureddine A. Boudriga received his PhD in Mathematics from the University Paris XI, France and in Computer Science from the University Tunis II, Tunisia. He is currently based at The University of 7th November at Carthage in Tunisia, where he is a professor of Telecommunications at the School of Communication Engineering, and Director of the Research Laboratory on Networks and Security. His research interests include network security, risk analysis and high-speed communication networks.

Sign In

Please sign in to access your account


Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.