Network Security Essentials: Applications and Standards / Edition 6
For courses in Corporate, Computer and Network Security .

Network Security: Innovations and Improvements

Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving readers a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.

1124176778
Network Security Essentials: Applications and Standards / Edition 6
For courses in Corporate, Computer and Network Security .

Network Security: Innovations and Improvements

Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving readers a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.

221.64 In Stock
Network Security Essentials: Applications and Standards / Edition 6

Network Security Essentials: Applications and Standards / Edition 6

by William Stallings
Network Security Essentials: Applications and Standards / Edition 6

Network Security Essentials: Applications and Standards / Edition 6

by William Stallings

Paperback(New Edition)

$221.64 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

For courses in Corporate, Computer and Network Security .

Network Security: Innovations and Improvements

Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving readers a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.


Product Details

ISBN-13: 9780134527338
Publisher: Pearson Education
Publication date: 07/28/2016
Edition description: New Edition
Pages: 464
Product dimensions: 7.00(w) x 9.10(h) x 0.80(d)

About the Author

Dr. William Stallings has authored 18 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologic.

He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

Dr. Stallings holds a Ph.D. from MIT in Computer Science and a B.S. from Notre Dame in electrical engineering.

Read an Excerpt

PREFACE:

Preface

In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

Objectives

It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed.

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study.

Plan of the Book

The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i report underlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh

Internet Services for Instructors and Students

There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...

Table of Contents

Brief Contents

  1. Introduction
Part I: Cryptography
  1. Symmetric Encryption and Message
  2. Public-Key Cryptography and Message
  3. Key Distribution and User Authentication
  4. Network Access Control and Cloud Security
  5. Transport-Level Security
  6. Wireless Network Security
  7. Electronic Mail Security
  8. IP Security
Part III: System Security
  1. Malicious Software
  2. Intruders
  3. Firewalls
APPENDICES
  • Appendix A Some Aspects of Number Theory
  • Appendix B Projects for Teaching Network Security

Preface

PREFACE:

Preface

In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

Objectives

It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed.

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study.

Plan of the Book

The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i reportunderlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh

Internet Services for Instructors and Students

There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...
From the B&N Reads Blog

Customer Reviews