
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Science | >> | Network Security Ess... |
ISBN
:
9788131716649
Publisher
:
Pearson
Subject
:
Computer Science, Computer Security, Encyclopaedias & Reference Works
Binding
:
Paperback
Pages
:
432
Year
:
2008
₹
375.0
₹
285.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
For one-semester courses on Network Security for computer science, engineering, and CIS majors. This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise treatment of the discipline of cryptography, covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange.Features Up-to-date treatment of Web security discusses the two most important Web security standards—SSL/TLS and SET. Unified presentation of intruders and viruses shows students the distinct threats and similarities of hackers and viruses, in order to promote a greater understanding of both topics. Coverage of both PGP and S/MIME for electronic mail security familiarizes students with the two most important approaches to e-mail security, enabling them to gain an understanding of both schemes at a detailed technical level. Treatment of firewalls explores this integral part of any network security capability. Concise overview of cryptography, authentication, and digital signatures gives students a solid yet concise look at the fundamental algorithms and techniques underlying network security. Chapter-end homework problems introduce students to new concepts and techniques, and reinforce material in the text with more than 100 problems. Optional research projects guide students, via a series of assignments, through researching a particular topic on the Internet and writing a report.Contents Preface 1. Introduction 1.1 The OSI Security Architecture 1.2 Security Attacks 1.3 Security Services 1.4 Security Mechanisms 1.5 A Model for Internetwork Security 1.6 Internet Standards the Internet Society 1.7 Outline of This Book 1.8 Recommended Reading 1.9 Internet and Web Resources I. CRYPTOGRAPHY 2. Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles 2.2 Symmetric Encryption Algorithms 2.3 Cipher Block Modes of Operation 2.4 Location of Encryption Devices 2.5 Key Distribution 2.6 Recommended Reading and Web Sites 2.7 Key Terms, Review Questions, and Problems 3. Public-Key Cryptography and Message Authentication 3.1 Approaches to Message Authentication 3.2 Secure Hash Functions and HMAC 3.3 Public Key Cryptography Principles 3.4 Public-Key Cryptography Algorithms 3.5 Digital Signatures 3.6 Key Management 3.7 Recommended Reading and Web Sites 3.8 Key Terms, Review Questions, and Problems Appendix 3A Prime Numbers and Modular Arithmetic II. NETWORK SECURITY APPLICATIONS 4. Authentication Applications 4.1 Kerberos 4.2 X.509 Directory Authentication Service 4.3 Public Key Infrastructure 4.4 Recommended Reading and Web Sites 4.4 Key Terms, Review Questions, and Problems Appendix 4A: Kerberos Encryption Techniques 5. Electronic Mail Security 5.1 Pretty Good Privacy (PGP) 5.2 S/MIME 5.3 RecommendedWeb Sites 5.4 Key Terms, Review Questions, and Problems Appendix 5A: Data Compression Using ZIP Appendix 5B: Radix-64 Conversion Appendix 5C: PGP Random Number Generation 6. IP Security 6.1 IP Security Overview 6.2 IP Security Architecture 6.3 Authentication Header 6.4 Encapsulating Security Payload 6.5 Combining Security Associations 6.6 Key Management 6.7 Recommended Reading and Web Sites 6.8 Key Terms, Review Questions, and Problems Appendix 6A: Internetworking and Internet Protocols 7. Web Security 7.1 Web Security Requirements 7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 7.3 Secure Electronic Transaction (SET) 7.4 Recommended Reading and Web Sites 7.5 Key Terms, Review Questions, and Problems 8. Network Management Security 8.1 Basic Concepts of SNMP 8.2 SNMPv1 Community Facility 8.3 SNMPv3 8.4 Recommended Reading and Web Sites 8.5 Key Terms, Review Questions, and Problems III. SYSTEM SECURITY 9. INTRUDERS 9.1 Intruders 9.2 Intrusion Detection 9.3 Password Management 9.4 Recommended Reading and Web Sites 9.5 Key Terms, Review Questions, and Problems Appendix 9A The Base-Rate Fallacy 10. MALICIOUS SOFTWARE 10.1 Viruses and Related Threats 10.2 Virus Countermeasures 10.3 Distributed Denial of Service Attacks 10.4 Recommended Reading and Web Sites 10.5 Key Terms, Review Questions, and Problems 11. FIREWALLS 11.1 Firewall Design Principles 11.2 Trusted Systems 11.3 Common Criteria for Information Technology Security Evaluation 11.4 Recommended Reading and Web Sites 11.5 Key Terms, Review Questions, and Problems APPENDICES A. Standards Cited in this Book B. Some Aspects of Number Theory B.1 Prime and Relatively Prime Numbers B.2 Modular Arithmetic C. Projects for Teaching Network Security C.1 Research Projects C.2 Programming Projects C.3 Reading/Report Assignments Glossary References Index
Related Items
-
of
Neural Networks and Artificial Intelligence for Biomedical Engineering
Donna L. Hudson
Starts At
15918.0
18510.0
14% OFF
Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition
Douglas R. Hofstadter
Starts At
813.0
1099.0
26% OFF
Designing Concurrent, Distributed, and Real-Time Applications with UML
Hassan Gomaa
Starts At
6079.0
7999.0
24% OFF
Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)
Christopher G. Langton
Starts At
6602.0
7677.0
14% OFF
Operating Systems : Concepts & Design,Milenkovic,Milenkovic
Milenkovic M
Starts At
828.0
1010.0
18% OFF