𝔖 Scriptorium
✦   LIBER   ✦

📁

Network security essentials: applications and standards

✍ Scribed by Stallings, William


Publisher
Pearson
Year
2016;2017
Tongue
English
Leaves
464
Edition
Global edition.,Sixth edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.
The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving readers a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.
KEY TOPICS:Introduction; Symmetric Encryption and Message; Public-Key Cryptography and Message; Key Distribution and User Authentication; Network Access Control and Cloud Security; Transport-Level Security; Wireless Network Security; Electronic Mail Security; IP Security; Malicious Software; Intruders; Firewalls
MARKETFor anyone interested in Network Security.

✦ Table of Contents


Cover......Page 1
Contents......Page 6
Preface......Page 11
About the Author......Page 17
Chapter 1 Introduction......Page 18
1.1 Computer Security Concepts......Page 21
1.2 The OSI Security Architecture......Page 25
1.3 Security Attacks......Page 26
1.4 Security Services......Page 28
1.5 Security Mechanisms......Page 32
1.6 Fundamental Security Design Principles......Page 33
1.7 Attack Surfaces and Attack Trees......Page 37
1.8 A Model for Network Security......Page 40
1.10 Key Terms, Review Questions, and Problems......Page 43
Chapter 2 Symmetric Encryption and Message Confidentiality......Page 46
2.1 Symmetric Encryption Principles......Page 47
2.2 Symmetric Block Encryption Algorithms......Page 53
2.3 Random and Pseudorandom Numbers......Page 60
2.4 Stream Ciphers and RC4......Page 64
2.5 Cipher Block Modes of Operation......Page 69
2.6 Key Terms, Review Questions, and Problems......Page 74
Chapter 3 Public-Key Cryptography and Message Authentication......Page 79
3.1 Approaches to Message Authentication......Page 80
3.2 Secure Hash Functions......Page 85
3.3 Message Authentication Codes......Page 92
3.4 Public-Key Cryptography Principles......Page 97
3.5 Public-Key Cryptography Algorithms......Page 101
3.6 Digital Signatures......Page 110
3.7 Key Terms, Review Questions, and Problems......Page 113
Chapter 4 Key Distribution and User Authentication......Page 120
4.1 Remote User Authentication Principles......Page 121
4.2 Symmetric Key Distribution Using Symmetric Encryption......Page 124
4.3 Kerberos......Page 125
4.4 Key Distribution Using Asymmetric Encryption......Page 138
4.5 X.509 Certificates......Page 140
4.6 Public-Key Infrastructure......Page 147
4.7 Federated Identity Management......Page 150
4.8 Key Terms, Review Questions, and Problems......Page 156
Chapter 5 Network Access Control and Cloud Security......Page 161
5.1 Network Access Control......Page 162
5.2 Extensible Authentication Protocol......Page 165
5.3 IEEE 802.1X Port-Based Network Access Control......Page 169
5.4 Cloud Computing......Page 171
5.5 Cloud Security Risks and Countermeasures......Page 177
5.6 Data Protection in the Cloud......Page 179
5.7 Cloud Security as a Service......Page 183
5.8 Addressing Cloud Computing Security Concerns......Page 186
5.9 Key Terms, Review Questions, and Problems......Page 187
Chapter 6 Transport-Level Security......Page 188
6.1 Web Security Considerations......Page 189
6.2 Transport Layer Security......Page 191
6.3 HTTPS......Page 208
6.4 Secure Shell (SSH)......Page 209
6.5 Key Terms, Review Questions, and Problems......Page 221
Chapter 7 Wireless Network Security......Page 223
7.1 Wireless Security......Page 224
7.2 Mobile Device Security......Page 227
7.3 IEEE 802.11 Wireless LAN Overview......Page 231
7.4 IEEE 802.11i Wireless LAN Security......Page 237
7.5 Key Terms, Review Questions, and Problems......Page 252
Chapter 8 Electronic Mail Security......Page 254
8.1 Internet Mail Architecture......Page 255
8.2 E-mail Formats......Page 259
8.3 E-mail Threats and Comprehensive E-mail Security......Page 267
8.4 S/MIME......Page 269
8.5 Pretty Good Privacy......Page 280
8.6 DNSSEC......Page 281
8.7 DNS-Based Authentication of Named Entities......Page 285
8.8 Sender Policy Framework......Page 287
8.9 DomainKeys Identified Mail......Page 290
8.10 Domain-Based Message Authentication, Reporting, and Conformance......Page 296
8.11 Key Terms, Review Questions, and Problems......Page 301
Chapter 9 IP Security......Page 303
9.1 IP Security Overview......Page 304
9.2 IP Security Policy......Page 310
9.3 Encapsulating Security Payload......Page 315
9.4 Combining Security Associations......Page 323
9.5 Internet Key Exchange......Page 326
9.6 Cryptographic Suites......Page 334
9.7 Key Terms, Review Questions, and Problems......Page 336
Chapter 10 Malicious Software......Page 338
10.1 Types of Malicious Software (Malware)......Page 339
10.2 Advanced Persistent Threat......Page 342
10.3 Propagation—Infected Content—Viruses......Page 343
10.4 Propagation—Vulnerability Exploit—Worms......Page 348
10.5 Propagation—Social Engineering—Spam E-mail, Trojans......Page 354
10.6 Payload—System Corruption......Page 356
10.7 Payload—Attack Agent—Zombie, Bots......Page 357
10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware......Page 358
10.9 Payload—Stealthing—Backdoors, Rootkits......Page 360
10.10 Countermeasures......Page 361
10.11 Distributed Denial of Service Attacks......Page 368
10.12 Key Terms, Review Questions, and Problems......Page 373
Chapter 11 Intruders......Page 376
11.1 Intruders......Page 377
11.2 Intrusion Detection......Page 382
11.3 Password Management......Page 397
11.4 Key Terms, Review Questions, and Problems......Page 407
Chapter 12 Firewalls......Page 411
12.1 The Need for Firewalls......Page 412
12.2 Firewall Characteristics and Access Policy......Page 413
12.3 Types of Firewalls......Page 415
12.4 Firewall Basing......Page 421
12.5 Firewall Location and Configurations......Page 424
12.6 Key Terms, Review Questions, and Problems......Page 429
Appendix A Some Aspects of Number Theory......Page 433
A.1 Prime and Relatively Prime Numbers......Page 434
A.2 Modular Arithmetic......Page 436
Appendix B Projects for Teaching Network Security......Page 438
B.1 Research Projects......Page 439
B.3 Programming Projects......Page 440
B.6 Firewall Projects......Page 441
B.9 Reading/Report Assignments......Page 442
References......Page 443
Credits......Page 449
B......Page 451
C......Page 452
D......Page 453
F......Page 454
I......Page 455
K......Page 456
M......Page 457
P......Page 458
R......Page 459
S......Page 460
V......Page 461
X......Page 462

✦ Subjects


Science;Computer Science;Textbooks;Computers;Reference;Technology;Nonfiction


📜 SIMILAR VOLUMES


Network Security Essentials :Application
✍ William Stallings 📂 Library 📅 2016 🏛 Pearson India 🌐 English

Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover or pages, Sale restriction may be printed on the book, but Book name, contents, and author are exactly same as Hardcover Edition. Fast delivery through DHL/FedEx express.

Network Security Essentials: Application
✍ William Stallings 📂 Library 📅 1999 🏛 Prentice Hall 🌐 English

This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and as a valuable reference or tutorial.It offers a large section on the discipline of cryptography -- covering algorithms and protocols underlying network

Network Security Essentials: Application
✍ William Stallings 📂 Library 📅 2010 🏛 Prentice Hall 🌐 English

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electr

Networking Security and Standards
✍ Weidong Kou (auth.) 📂 Library 📅 1997 🏛 Springer US 🌐 English

<p>Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be

Handbook of wireless local area networks
✍ Mohammad Ilyas, Syed Ahson 📂 Library 📅 2005 🏛 Taylor & Francis 🌐 English

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers t

Handbook of Wireless Local Area Networks
✍ Mohammad Ilyas, Syed A. Ahson 📂 Library 📅 2005 🏛 CRC Press 🌐 English

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers t