LEADER 06960nam 2200541 450 001 9910151655103321 005 20230803221423.0 010 $a0-273-79380-2 035 $a(CKB)2550000001307930 035 $a(MiAaPQ)EBC5173651 035 $a(WaSeSS)116460 035 $a(MiAaPQ)EBC5138822 035 $a(Au-PeEL)EBL5138822 035 $a(CaONFJC)MIL613616 035 $a(OCoLC)881035238 035 $a(EXLCZ)992550000001307930 100 $a20180105h20142014 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aNetwork security essentials $eapplications and standards /$fWilliam Stallings ; contributions by B. R. Chandavarkar 205 $aFifth edition, international edition. 210 1$aBoston, [Massachusetts] :$cPearson,$d2014. 210 4$dİ2014 215 $a1 online resource (447 pages) $cillustrations 311 $a0-273-79336-5 311 $a1-306-82365-X 320 $aIncludes bibliographical references and index. 327 $aCover -- Contents -- Online Resources -- Preface -- About the Author -- Chapter 1 Introduction -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Standards -- 1.8 Outline of This Book -- 1.9 Recommended Reading -- 1.10 Internet and Web Resources -- 1.11 Key Terms, Review Questions, and Problems -- PART ONE: CRYPTOGRAPHY -- Chapter 2 Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Block Encryption Algorithms -- 2.3 Random and Pseudorandom Numbers -- 2.4 Stream Ciphers and RC4 -- 2.5 Cipher Block Modes of Operation -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions -- 3.3 Message Authentication Codes -- 3.4 Public-Key Cryptography Principles -- 3.5 Public-Key Cryptography Algorithms -- 3.6 Digital Signatures -- 3.7 Recommended Reading -- 3.8 Key Terms, Review Questions, and Problems -- PART TWO: NETWORK SECURITY APPLICATIONS -- Chapter 4 Key Distribution and User Authentication -- 4.1 Symmetric Key Distribution Using Symmetric Encryption -- 4.2 Kerberos -- 4.3 Key Distribution Using Asymmetric Encryption -- 4.4 X.509 Certificates -- 4.5 Public-Key Infrastructure -- 4.6 Federated Identity Management -- 4.7 Recommended Reading -- 4.8 Key Terms, Review Questions, and Problems -- Chapter 5 Network Access Control and Cloud Security -- 5.1 Network Access Control -- 5.2 Extensible Authentication Protocol -- 5.3 IEEE 802.1X Port-Based Network Access Control -- 5.4 Cloud Computing -- 5.5 Cloud Security Risks and Countermeasures -- 5.6 Data Protection in the Cloud -- 5.7 Cloud Security as a Service. 327 $a5.8 Recommended Reading -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Transport-Level Security -- 6.1 Web Security Considerations -- 6.2 Secure Sockets Layer (SSL) -- 6.3 Transport Layer Security (TLS) -- 6.4 HTTPS -- 6.5 Secure Shell (SSH) -- 6.6 Recommended Reading -- 6.7 Key Terms, Review Questions, and Problems -- Chapter 7 Wireless Network Security -- 7.1 Wireless Security -- 7.2 Mobile Device Security -- 7.3 IEEE 802.11 Wireless LAN Overview -- 7.4 IEEE 802.11i Wireless LAN Security -- 7.5 Recommended Reading -- 7.6 Key Terms, Review Questions, and Problems -- Chapter 8 Electronic Mail Security -- 8.1 Pretty Good Privacy (PGP) -- 8.2 S/MIME -- 8.3 DomainKeys Identified Mail (DKIM) -- 8.4 Recommended Reading -- 8.5 Key Terms, Review Questions, and Problems -- Chapter 9 IP Security -- 9.1 IP Security Overview -- 9.2 IP Security Policy -- 9.3 Encapsulating Security Payload -- 9.4 Combining Security Associations -- 9.5 Internet Key Exchange -- 9.6 Cryptographic Suites -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- PART THREE: SYSTEM SECURITY -- Chapter 10 Malicious Software -- 10.1 Types of Malicious Software (Malware) -- 10.2 Propagation-Infected Content-Viruses -- 10.3 Propagation-Vulnerability Exploit-Worms -- 10.4 Propagation-Social Engineering-SPAM E-mail, Trojans -- 10.5 Payload-System Corruption -- 10.6 Payload-Attack Agent-Zombie, Bots -- 10.7 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 10.8 Payload-Stealthing-Backdoors, Rootkits -- 10.9 Countermeasures -- 10.10 Distributed Denial of Service Attacks -- 10.11 Recommended Reading -- 10.12 Key Terms, Review Questions, and Problems -- Chapter 11 Intruders -- 11.1 Intruders -- 11.2 Intrusion Detection -- 11.3 Password Management -- 11.4 Recommended Reading -- 11.5 Key Terms, Review Questions, and Problems -- Chapter 12 Firewalls. 327 $a12.1 The Need for Firewalls -- 12.2 Firewall Characteristics -- 12.3 Types of Firewalls -- 12.4 Firewall Basing -- 12.5 Firewall Location and Configurations -- 12.6 Recommended Reading -- 12.7 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Some Aspects of Number Theory -- A.1 Prime and Relatively Prime Numbers -- A.2 Modular Arithmetic -- Appendix B: Projects for Teaching Network Security -- B.1 Research Projects -- B.2 Hacking Project -- B.3 Programming Projects -- B.4 Laboratory Exercises -- B.5 Practical Security Assessments -- B.6 Firewall Projects -- B.7 Case Studies -- B.8 Writing Assignments -- B.9 Reading/Report Assignments -- References -- Credits -- Index. 330 $aFor computer science, computer engineering, and electrical engineering majors taking a one-semester undergraduate courses on network security.   A practical survey of network security applications and standards, with unmatched support for instructors and students.   In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.    Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.   . 606 $aComputer networks$xSecurity measures 606 $aComputer security 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a005.8 700 $aStallings$b William$059711 702 $aChandavarkar$b B. R. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910151655103321 996 $aNetwork security essentials$9377609 997 $aUNINA