Vai al contenuto principale della pagina

Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Stallings William Visualizza persona
Titolo: Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar Visualizza cluster
Pubblicazione: Boston, [Massachusetts] : , : Pearson, , 2014
©2014
Edizione: Fifth edition, international edition.
Descrizione fisica: 1 online resource (447 pages) : illustrations
Disciplina: 005.8
Soggetto topico: Computer networks - Security measures
Computer security
Persona (resp. second.): ChandavarkarB. R.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Cover -- Contents -- Online Resources -- Preface -- About the Author -- Chapter 1 Introduction -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Standards -- 1.8 Outline of This Book -- 1.9 Recommended Reading -- 1.10 Internet and Web Resources -- 1.11 Key Terms, Review Questions, and Problems -- PART ONE: CRYPTOGRAPHY -- Chapter 2 Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Block Encryption Algorithms -- 2.3 Random and Pseudorandom Numbers -- 2.4 Stream Ciphers and RC4 -- 2.5 Cipher Block Modes of Operation -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions -- 3.3 Message Authentication Codes -- 3.4 Public-Key Cryptography Principles -- 3.5 Public-Key Cryptography Algorithms -- 3.6 Digital Signatures -- 3.7 Recommended Reading -- 3.8 Key Terms, Review Questions, and Problems -- PART TWO: NETWORK SECURITY APPLICATIONS -- Chapter 4 Key Distribution and User Authentication -- 4.1 Symmetric Key Distribution Using Symmetric Encryption -- 4.2 Kerberos -- 4.3 Key Distribution Using Asymmetric Encryption -- 4.4 X.509 Certificates -- 4.5 Public-Key Infrastructure -- 4.6 Federated Identity Management -- 4.7 Recommended Reading -- 4.8 Key Terms, Review Questions, and Problems -- Chapter 5 Network Access Control and Cloud Security -- 5.1 Network Access Control -- 5.2 Extensible Authentication Protocol -- 5.3 IEEE 802.1X Port-Based Network Access Control -- 5.4 Cloud Computing -- 5.5 Cloud Security Risks and Countermeasures -- 5.6 Data Protection in the Cloud -- 5.7 Cloud Security as a Service.
5.8 Recommended Reading -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Transport-Level Security -- 6.1 Web Security Considerations -- 6.2 Secure Sockets Layer (SSL) -- 6.3 Transport Layer Security (TLS) -- 6.4 HTTPS -- 6.5 Secure Shell (SSH) -- 6.6 Recommended Reading -- 6.7 Key Terms, Review Questions, and Problems -- Chapter 7 Wireless Network Security -- 7.1 Wireless Security -- 7.2 Mobile Device Security -- 7.3 IEEE 802.11 Wireless LAN Overview -- 7.4 IEEE 802.11i Wireless LAN Security -- 7.5 Recommended Reading -- 7.6 Key Terms, Review Questions, and Problems -- Chapter 8 Electronic Mail Security -- 8.1 Pretty Good Privacy (PGP) -- 8.2 S/MIME -- 8.3 DomainKeys Identified Mail (DKIM) -- 8.4 Recommended Reading -- 8.5 Key Terms, Review Questions, and Problems -- Chapter 9 IP Security -- 9.1 IP Security Overview -- 9.2 IP Security Policy -- 9.3 Encapsulating Security Payload -- 9.4 Combining Security Associations -- 9.5 Internet Key Exchange -- 9.6 Cryptographic Suites -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- PART THREE: SYSTEM SECURITY -- Chapter 10 Malicious Software -- 10.1 Types of Malicious Software (Malware) -- 10.2 Propagation-Infected Content-Viruses -- 10.3 Propagation-Vulnerability Exploit-Worms -- 10.4 Propagation-Social Engineering-SPAM E-mail, Trojans -- 10.5 Payload-System Corruption -- 10.6 Payload-Attack Agent-Zombie, Bots -- 10.7 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 10.8 Payload-Stealthing-Backdoors, Rootkits -- 10.9 Countermeasures -- 10.10 Distributed Denial of Service Attacks -- 10.11 Recommended Reading -- 10.12 Key Terms, Review Questions, and Problems -- Chapter 11 Intruders -- 11.1 Intruders -- 11.2 Intrusion Detection -- 11.3 Password Management -- 11.4 Recommended Reading -- 11.5 Key Terms, Review Questions, and Problems -- Chapter 12 Firewalls.
12.1 The Need for Firewalls -- 12.2 Firewall Characteristics -- 12.3 Types of Firewalls -- 12.4 Firewall Basing -- 12.5 Firewall Location and Configurations -- 12.6 Recommended Reading -- 12.7 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Some Aspects of Number Theory -- A.1 Prime and Relatively Prime Numbers -- A.2 Modular Arithmetic -- Appendix B: Projects for Teaching Network Security -- B.1 Research Projects -- B.2 Hacking Project -- B.3 Programming Projects -- B.4 Laboratory Exercises -- B.5 Practical Security Assessments -- B.6 Firewall Projects -- B.7 Case Studies -- B.8 Writing Assignments -- B.9 Reading/Report Assignments -- References -- Credits -- Index.
Sommario/riassunto: For computer science, computer engineering, and electrical engineering majors taking a one-semester undergraduate courses on network security.   A practical survey of network security applications and standards, with unmatched support for instructors and students.   In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.    Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.  &nbsp.
Titolo autorizzato: Network security essentials  Visualizza cluster
ISBN: 0-273-79380-2
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910151655103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui