Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
If you have the responsibility to enforce security policies for your ATM networks, implementing ATM security devices (both hardware and software), or simply need to better understand the mechanisms defined in the ATM Forum Security Specification 1.1, this book should be useful reading. Specifically targeted at ATM network security, including cryptographic and architectural techniques, it provides the reader with a solid understanding of the current and future state of ATM security. From an introduction to network security and fundamentals, to implementing and using ATM security, security association establishment protocols, initial authentication, data origin authentication/integrity, encryption, access control, and PNNI routing, this book provides practical need-to-know information for network architects, ATM security implementers and researchers who wish to gain a thorough understanding of the current and future state of ATM security standards and mechanisms.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
If you have the responsibility to enforce security policies for your ATM networks, implementing ATM security devices (both hardware and software), or simply need to better understand the mechanisms defined in the ATM Forum Security Specification 1.1, this book should be useful reading. Specifically targeted at ATM network security, including cryptographic and architectural techniques, it provides the reader with a solid understanding of the current and future state of ATM security. From an introduction to network security and fundamentals, to implementing and using ATM security, security association establishment protocols, initial authentication, data origin authentication/integrity, encryption, access control, and PNNI routing, this book provides practical need-to-know information for network architects, ATM security implementers and researchers who wish to gain a thorough understanding of the current and future state of ATM security standards and mechanisms.