𝔖 Scriptorium
✦   LIBER   ✦

📁

Network Security Essentials :Application And Standards,

✍ Scribed by William Stallings


Publisher
Pearson India
Year
2016
Tongue
English
Leaves
467
Edition
6
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover or pages, Sale restriction may be printed on the book, but Book name, contents, and author are exactly same as Hardcover Edition. Fast delivery through DHL/FedEx express.

✦ Table of Contents


Cover
About Pearson
Title
Copyright
Dedication
Contents
Preface
About the Author
Chapter 1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 Fundamental Security Design Principles
1.7 Attack Surfaces and Attack Trees
1.8 A Model for Network Security
1.9 Standards
1.10 Key Terms, Review Questions, and Problems
Part One: Cryptography
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
2.6 Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Public-Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures
3.7 Key Terms, Review Questions, and Problems
Part Two: Network Security Applications
Chapter 4 Key Distribution and User Authentication
4.1 Remote User Authentication Principles
4.2 Symmetric Key Distribution Using Symmetric Encryption
4.3 Kerberos
4.4 Key Distribution Using Asymmetric Encryption
4.5 X.509 Certificates
4.6 Public-Key Infrastructure
4.7 Federated Identity Management
4.8 Key Terms, Review Questions, and Problems
Chapter 5 Network Access Control and Cloud Security
5.1 Network Access Control
5.2 Extensible Authentication Protocol
5.3 IEEE 802.1X Port-Based Network Access Control
5.4 Cloud Computing
5.5 Cloud Security Risks and Countermeasures
5.6 Data Protection in the Cloud
5.7 Cloud Security as a Service
5.8 Addressing Cloud Computing Security Concerns
5.9 Key Terms, Review Questions, and Problems
Chapter 6 Transport-Level Security
6.1 Web Security Considerations
6.2 Transport Layer Security
6.3 HTTPS
6.4 Secure Shell (SSH)
6.5 Key Terms, Review Questions, and Problems
Chapter 7 Wireless Network Security
7.1 Wireless Security
7.2 Mobile Device Security
7.3 IEEE 802.11 Wireless LAN Overview
7.4 IEEE 802.11i Wireless LAN Security
7.5 Key Terms, Review Questions, and Problems
Chapter 8 Electronic Mail Security
8.1 Internet Mail Architecture
8.2 E-mail Formats
8.3 E-mail Threats and Comprehensive E-mail Security
8.4 S/MIME
8.5 Pretty Good Privacy
8.6 DNSSEC
8.7 DNS-Based Authentication of Named Entities
8.8 Sender Policy Framework
8.9 DomainKeys Identified Mail
8.10 Domain-Based Message Authentication, Reporting, and Conformance
8.11 Key Terms, Review Questions, and Problems
Chapter 9 IP Security
9.1 IP Security Overview
9.2 IP Security Policy
9.3 Encapsulating Security Payload
9.4 Combining Security Associations
9.5 Internet Key Exchange
9.6 Cryptographic Suites
9.7 Key Terms, Review Questions, and Problems
Part Three: System Security
Chapter 10 Malicious Software
10.1 Types of Malicious Software (Malware)
10.2 Advanced Persistent Threat
10.3 Propagation—Infected Content—Viruses
10.4 Propagation—Vulnerability Exploit—Worms
10.5 Propagation—Social Engineering—Spam E-mail, Trojans
10.6 Payload—System Corruption
10.7 Payload—Attack Agent—Zombie, Bots
10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware
10.9 Payload—Stealthing—Backdoors, Rootkits
10.10 Countermeasures
10.11 Distributed Denial of Service Attacks
10.12 Key Terms, Review Questions, and Problems
Chapter 11 Intruders
11.1 Intruders
11.2 Intrusion Detection
11.3 Password Management
11.4 Key Terms, Review Questions, and Problems
Chapter 12 Firewalls
12.1 The Need for Firewalls
12.2 Firewall Characteristics and Access Policy
12.3 Types of Firewalls
12.4 Firewall Basing
12.5 Firewall Location and Configurations
12.6 Key Terms, Review Questions, and Problems
Appendices
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
Appendix B Projects for Teaching Network Security
B.1 Research Projects
B.2 Hacking Project
B.3 Programming Projects
B.4 Laboratory Exercises
B.5 Practical Security Assessments
B.6 Firewall Projects
B.7 Case Studies
B.8 Writing Assignments
B.9 Reading/Report Assignments
References
Credits
Index


📜 SIMILAR VOLUMES


Network Security Essentials: Application
✍ William Stallings 📂 Library 📅 1999 🏛 Prentice Hall 🌐 English

This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and as a valuable reference or tutorial.It offers a large section on the discipline of cryptography -- covering algorithms and protocols underlying network

Network security essentials: application
✍ Stallings, William 📂 Library 📅 2016;2017 🏛 Pearson 🌐 English

<b></b>Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their pri

Network Security Essentials: Application
✍ William Stallings 📂 Library 📅 2010 🏛 Prentice Hall 🌐 English

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electr

Networking Security and Standards
✍ Weidong Kou (auth.) 📂 Library 📅 1997 🏛 Springer US 🌐 English

<p>Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be

Handbook of wireless local area networks
✍ Mohammad Ilyas, Syed Ahson 📂 Library 📅 2005 🏛 Taylor & Francis 🌐 English

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers t

Handbook of Wireless Local Area Networks
✍ Mohammad Ilyas, Syed A. Ahson 📂 Library 📅 2005 🏛 CRC Press 🌐 English

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers t