libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

hoffmann paul (curatore); terplan kornel (curatore) - intelligence support systems
Zoom

Intelligence Support Systems Technologies for Lawful Intercepts

;




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
143,98 €
NICEPRICE
136,78 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 07/2005
Edizione: 1° edizione





Trama

Addressing the needs of telecommunications service providers, law enforcement agencies, representatives of governments and international standards bodies, and vendors, this volume offers solutions for many technological challenges. It explains how to provide equipment and probe for lawful intercepts, and details methods for reducing the performance impacts on network equipment that result from intercepts.




Note Editore

Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.




Sommario

Setting the Stage Positioning Lawful Intercepts (LIs) and SurveillanceISS Basics and Application AreasThe Position of ISS among Other Support and Security SystemsBasic Requirements for LIs Electronic Surveillance Laws Framework of LIs Challenges Service Portfolios Overview Basic Principles for Networking Technologies Service Portfolios Circuit-Switched Voice and VoIPInternet-Related TechnologiesWireless Networks Cable NetworksSummary Legal and Technical Standards for Lawful Intercepts Principal Functions of Interception Surveillance Rules and Procedures in the United StatesSurveillance Rules and Procedures in the European Community Surveillance Rules and Procedures in Japan CALEA Reference Model with the J-STD-025 StandardEuropean Telecommunications Standard Institute (ETSI)Reference Model for the European Community .................................85Summary Intercept Access Points in Infrastructure ComponentsBlueprints and Guidelines for TSPs Reference Model of the InfrastructurePrinciples of Monitoring and Intercepts (Hardware and Software Probes)Use of Signaling Systems for LIs Resource Planning for LIs Summary Extended Functions for Lawful Intercepts Principal Functions of LIsRole of MediationHandover Interfaces (HIs)Data Retention and Data Preservation Solutions Document Management and Document-Related Technology (DRT)Information Life-Cycle ManagementReceiver ApplicationsSummary Lawful Intercept Solution Architectures Frameworks for LIs Key Products and Players Siemens AG Monitoring Center Selection CriteriaSummary Case Studies for ISS SolutionsCase Study 1: Wireline Voice Intercept and SurveillanceSolutions from Lucent TechnologiesCase Study 2: Lawful Interception in CDMA Wireless IPNetworks from SS8 Networks Case Study 3: LIs for 3G Networks Using ALISCase Study 4: Lawful Interception for IP Networks Using ALISCase Study 5: Lawful Intercepts for Cable VoIP Networks fromSS8 Networks Case Study 6: Monitoring and Logging Web Activities Case Study 7: Lawful Interception of VoIP by NetCentrex andGTEN AG Case Study 8: Lawful Interception for E-mail Server Providersby GTEN AGCase Study 9: MC Case Examples from Siemens AGSummary Operating Lawful Intercepts Operational Requirements Prerequisites of Lawful Interception in theUnited States, Europe, and Japan Executing LI Missions in the United States, Europe, and JapanFunctional Role ModelAdministration and ManagementSecurity Considerations Human Resources Summary Costs and Reimbursement of Expenses forTelecommunications Service Providers Cost Components Quantification of Costs and Reimbursement StrategiesReturn on Investment (ROI)Summary Outsourcing Lawful Interception FunctionsForces Driving OutsourcingThe LEA ModelThe ASP Model The Service Bureau ModelSourcing GovernanceWho Are the Principal Players?Summary Summary and TrendsAppendicesA GlossaryB Acronyms C References










Altre Informazioni

ISBN:

9780849328558

Condizione: Nuovo
Dimensioni: 9.25 x 6.125 in Ø 1.80 lb
Formato: Copertina rigida
Illustration Notes:150 b/w images and 23 tables
Pagine Arabe: 488


Dicono di noi