0

My Bag

0.00

Download App

Network Security Essentials : Applications and Standards 24.0%OFF

Network Security Essentials : Applications and Standards

by William Stallings

  • ISBN

    :  

    9788131716649

  • Publisher

    :  

    Pearson

  • Subject

    :  

    Computer Science, Computer Security, Encyclopaedias & Reference Works

  • Binding

    :  

    Paperback

  • Pages

    :  

    432

  • Year

    :  

    2008

375.0

24.0% OFF

285.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    For one-semester courses on Network Security for computer science, engineering, and CIS majors. This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise treatment of the discipline of cryptography, covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange.Features Up-to-date treatment of Web security discusses the two most important Web security standards—SSL/TLS and SET. Unified presentation of intruders and viruses shows students the distinct threats and similarities of hackers and viruses, in order to promote a greater understanding of both topics. Coverage of both PGP and S/MIME for electronic mail security familiarizes students with the two most important approaches to e-mail security, enabling them to gain an understanding of both schemes at a detailed technical level. Treatment of firewalls explores this integral part of any network security capability. Concise overview of cryptography, authentication, and digital signatures gives students a solid yet concise look at the fundamental algorithms and techniques underlying network security. Chapter-end homework problems introduce students to new concepts and techniques, and reinforce material in the text with more than 100 problems. Optional research projects guide students, via a series of assignments, through researching a particular topic on the Internet and writing a report.Contents Preface 1. Introduction 1.1 The OSI Security Architecture 1.2 Security Attacks 1.3 Security Services 1.4 Security Mechanisms 1.5 A Model for Internetwork Security 1.6 Internet Standards the Internet Society 1.7 Outline of This Book 1.8 Recommended Reading 1.9 Internet and Web Resources I. CRYPTOGRAPHY 2. Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles 2.2 Symmetric Encryption Algorithms 2.3 Cipher Block Modes of Operation 2.4 Location of Encryption Devices 2.5 Key Distribution 2.6 Recommended Reading and Web Sites 2.7 Key Terms, Review Questions, and Problems 3. Public-Key Cryptography and Message Authentication 3.1 Approaches to Message Authentication 3.2 Secure Hash Functions and HMAC 3.3 Public Key Cryptography Principles 3.4 Public-Key Cryptography Algorithms 3.5 Digital Signatures 3.6 Key Management 3.7 Recommended Reading and Web Sites 3.8 Key Terms, Review Questions, and Problems Appendix 3A Prime Numbers and Modular Arithmetic II. NETWORK SECURITY APPLICATIONS 4. Authentication Applications 4.1 Kerberos 4.2 X.509 Directory Authentication Service 4.3 Public Key Infrastructure 4.4 Recommended Reading and Web Sites 4.4 Key Terms, Review Questions, and Problems Appendix 4A: Kerberos Encryption Techniques 5. Electronic Mail Security 5.1 Pretty Good Privacy (PGP) 5.2 S/MIME 5.3 RecommendedWeb Sites 5.4 Key Terms, Review Questions, and Problems Appendix 5A: Data Compression Using ZIP Appendix 5B: Radix-64 Conversion Appendix 5C: PGP Random Number Generation 6. IP Security 6.1 IP Security Overview 6.2 IP Security Architecture 6.3 Authentication Header 6.4 Encapsulating Security Payload 6.5 Combining Security Associations 6.6 Key Management 6.7 Recommended Reading and Web Sites 6.8 Key Terms, Review Questions, and Problems Appendix 6A: Internetworking and Internet Protocols 7. Web Security 7.1 Web Security Requirements 7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 7.3 Secure Electronic Transaction (SET) 7.4 Recommended Reading and Web Sites 7.5 Key Terms, Review Questions, and Problems 8. Network Management Security 8.1 Basic Concepts of SNMP 8.2 SNMPv1 Community Facility 8.3 SNMPv3 8.4 Recommended Reading and Web Sites 8.5 Key Terms, Review Questions, and Problems III. SYSTEM SECURITY 9. INTRUDERS 9.1 Intruders 9.2 Intrusion Detection 9.3 Password Management 9.4 Recommended Reading and Web Sites 9.5 Key Terms, Review Questions, and Problems Appendix 9A The Base-Rate Fallacy 10. MALICIOUS SOFTWARE 10.1 Viruses and Related Threats 10.2 Virus Countermeasures 10.3 Distributed Denial of Service Attacks 10.4 Recommended Reading and Web Sites 10.5 Key Terms, Review Questions, and Problems 11. FIREWALLS 11.1 Firewall Design Principles 11.2 Trusted Systems 11.3 Common Criteria for Information Technology Security Evaluation 11.4 Recommended Reading and Web Sites 11.5 Key Terms, Review Questions, and Problems APPENDICES A. Standards Cited in this Book B. Some Aspects of Number Theory B.1 Prime and Relatively Prime Numbers B.2 Modular Arithmetic C. Projects for Teaching Network Security C.1 Research Projects C.2 Programming Projects C.3 Reading/Report Assignments Glossary References Index

Related Items

-

of

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • The Man-eating Leopard of Rudraprayag (Oxford India Paperbacks)

    Jim Corbett

    Starts At

    275.0

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)

    Christopher G. Langton

    Starts At

    6602.0

    7677.0

    14% OFF

  • OFFER

    E.Encyclopedia

    JO BOURNE

    Starts At

    662.0

    895.0

    26% OFF

  • OFFER

    Operating Systems : Concepts & Design,Milenkovic,Milenkovic

    Milenkovic M

    Starts At

    828.0

    1010.0

    18% OFF

  • OFFER

    Competing For The Future books

    Hamel

    Starts At

    495.0

    635.0

    22% OFF

  • OFFER

    Britannica Concise Encyclopedia

    Jacob E. Safra

    Starts At

    2186.0

    2995.0

    27% OFF

  • OFFER

    INDIAN HISTORY (ANCIENT AND MEDIEVAL)

    Britannica

    Starts At

    226.0

    290.0

    22% OFF

  • OFFER

    OPTICAL ELECTRONICS

    Ghatak

    Starts At

    415.0

    495.0

    16% OFF

  • The Financial Expert

    R. K Narayan

    Starts At

    230.0

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary