Internet and Wireless Security
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.
This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.
About the Editors
Robert Temple is the chief security architect for BTexact Technologies. He is responsible for business development of BTexact's core security competence and for reviewing and assessing new security technologies. He has worked for BT for 16 years in the systems development field, concentrating on IT security and, most recently, on commercial deployment of PKI. Prior to his current role, Temple was head of group security policy and also head of the IT security unit. He is a member of the Steering Group of the European Electronic Signature Standardisation Initiative, the BCS, the Information Security Committee and the Association for Computing Machinery.
John Regnault is head of security solutions for BTexact Technologies. He has worked for BT for 30 years, specialising in research and development on a wide range of communications technologies, and has published 35 technical papers. During the past eight years Regnault has developed and expanded the scope of BT's security research team. His team of 25 security specialists is now responsible for consulting on new security issues resulting from advances in technology across the BT group. This team covers a wide range of application areas including encryption, PKIs and secure network communications.
Robert Temple, John Regnault