Bibliographic record and links to related information available from the Library of Congress catalog
Information from electronic data provided by the publisher. May be incomplete or contain other coding.
Preface. Acknowledgments. List of Figures. List of Tables. TMN OVERVIEW. A Brief History of TMN. Architectural Views of the TMN. SECURITY OVERVIEW. TMN Attacks and Defenses. Basic Security Mechanisms. Support Mechanisms. SECURING THE TMN. Security of OSI-Based TMN Protocols. EDI-Based TMN Security. CORBA-Based TMN Security. SNMP-Based TMN Security. Portraits Gallery. SECURITY MANAGEMENT. Management of Security Information. SECURITY OPERATIONS. Security Functions and Operations. Security Management Functions and Operations. Future Enhancements to the TMN Security. Abbreviations. Suggested Reading. References. Index. About the Author.