Network Security Essentials: Applications and Standards / Edition 4

Network Security Essentials: Applications and Standards / Edition 4

by William Stallings
     
 

View All Available Formats & Editions

ISBN-10: 0136108059

ISBN-13: 9780136108054

Pub. Date: 03/26/2010

Publisher: Prentice Hall

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security:

Overview

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

Product Details

ISBN-13:
9780136108054
Publisher:
Prentice Hall
Publication date:
03/26/2010
Edition description:
Older Edition
Pages:
432
Product dimensions:
6.90(w) x 9.00(h) x 0.80(d)

Table of Contents

Prefacexiii
Chapter 1Introduction1
1.1Security Trends4
1.2The OSI Security Architecture6
1.3Security Attacks7
1.4Security Services11
1.5Security Mechanisms14
1.6A Model for Internetwork Security17
1.7Internet Standards the Internet Society19
1.8Outline of This Book22
1.9Recommended Reading23
1.10Internet and Web Resources23
1.11Key Terms, Review Questions, and Problems25
Part 1Cryptography26
Chapter 2Symmetric Encryption and Message Confidentiality28
2.1Symmetric Encryption Principles29
2.2Symmetric Block Encryption Algorithms35
2.3Stream Ciphers and RC443
2.4Cipher Block Modes of Operation46
2.5Location of Encryption Devices51
2.6Key Distribution52
2.7Recommended Reading and Web Sites55
2.8Key Terms, Review Questions, and Problems56
Chapter 3Public-Key Cryptography and Message Authentication59
3.1Approaches to Message Authentication60
3.2Secure Hash Functions and HMAC64
3.3Public Key Cryptography Principles74
3.4Public-Key Cryptography Algorithms78
3.5Digital Signatures85
3.6Key Management85
3.7Recommended Reading and Web Sites87
3.8Key Terms, Review Questions, and Problems88
Part 2Network Security Applications92
Chapter 4Authentication Applications94
4.1Kerberos95
4.2X.509 Directory Authentication Service113
4.3Public Key Infrastructure122
4.4Recommended Reading and Web Sites124
4.4Key Terms, Review Questions, and Problems125
Appendix 4AKerberos Encryption Techniques127
Chapter 5Electronic Mail Security130
5.1Pretty Good Privacy (PGP)132
5.2S/MIME151
5.3Recommended Web Sites168
5.4Key Terms, Review Questions, and Problems168
Appendix 5AData Compression Using ZIP169
Appendix 5BRadix-64 Conversion172
Appendix 5CPGP Random Number Generation173
Chapter 6IP Security177
6.1IP Security Overview179
6.2IP Security Architecture181
6.3Authentication Header187
6.4Encapsulating Security Payload192
6.5Combining Security Associations197
6.6Key Management200
6.7Recommended Reading and Web Sites210
6.8Key Terms, Review Questions, and Problems211
Appendix 6AInternetworking and Internet Protocols212
Chapter 7Web Security221
7.1Web Security Requirements222
7.2Secure Sockets Layer (SSL) and Transport Layer Security (TLS)225
7.3Secure Electronic Transaction (SET)243
7.4Recommended Reading and Web Sites254
7.5Key Terms, Review Questions, and Problems255
Chapter 8Network Management Security257
8.1Basic Concepts of SNMP258
8.2SNMPv1 Community Facility266
8.3SNMPv3269
8.4Recommended Reading and Web Sites292
8.5Key Terms, Review Questions, and Problems293
Part 3System Security297
Chapter 9Intruders299
9.1Intruders301
9.2Intrusion Detection304
9.3Password Management316
9.4Recommended Reading and Web Sites325
9.5Key Terms, Review Questions, and Problems326
Appendix 9AThe Base-Rate Fallacy328
Chapter 10Malicious Software332
10.1Viruses and Related Threats333
10.2Virus Countermeasures344
10.3Distributed Denial of Service Attacks348
10.4Recommended Reading and Web Sites353
10.5Key Terms, Review Questions, and Problems354
Chapter 11Firewalls355
11.1Firewall Design Principles356
11.2Trusted Systems368
11.3Common Criteria for Information Technology Security Evaluation374
11.4Recommended Reading and Web Sites378
11.5Key Terms, Review Questions, and Problems379
Appendices381
Appendix ASome Aspects of Number Theory381
A.1Prime and Relatively Prime Numbers382
A.2Modular Arithmetic384
Appendix BProjects for Teaching Network Security386
B.1Research Projects387
B.2Programming Projects388
B.3Laboratory Exercises388
B.4Writing Assignments388
B.5Reading/Report Assignments389
Glossary390
References396
Index402

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >