Network Security Essentials Applications and Standards / Edition 5

Paperback (Print)
Rent
Rent from BN.com
$21.24
(Save 79%)
Est. Return Date: 12/24/2014
Used and New from Other Sellers
Used and New from Other Sellers
from $90.07
Usually ships in 1-2 business days
(Save 11%)
Other sellers (Paperback)
  • All (13) from $90.07   
  • New (11) from $92.82   
  • Used (2) from $90.07   
Close
Sort by
Page 1 of 2
Showing 1 – 10 of 13 (2 pages)
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$90.07
Seller since 2008

Feedback rating:

(17719)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Like New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$92.82
Seller since 2008

Feedback rating:

(17719)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$92.87
Seller since 2009

Feedback rating:

(10471)

Condition: New
New Book. Shipped from US within 4 to 14 business days. Established seller since 2000

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$93.96
Seller since 2007

Feedback rating:

(23493)

Condition: New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$96.24
Seller since 2008

Feedback rating:

(2327)

Condition: Very Good
0133370437 Item in very good condition and at a great price! Textbooks may not include supplemental items i.e. CDs, access codes etc... All day low prices, buy from us sell to us ... we do it all!! Read more Show Less

Ships from: Aurora, IL

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Express, 48 States
$96.72
Seller since 2010

Feedback rating:

(1481)

Condition: New
New Book. Shipped from US. Standard Shipping is 4 to 14 business days. Expedited Shipping is 3 to 6 business days. Established seller since 2000.

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$96.96
Seller since 2014

Feedback rating:

(205)

Condition: New
New Book. FREE TRACKING ON ALL ORDERS. Shipped from US. Standard Shipping is 4 to 14 business days. Expedited Shipping is 3 to 6 business days. Established seller since 2000

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$99.04
Seller since 2005

Feedback rating:

(4086)

Condition: New
fifth New [ No Hassle 30 Day Returns ] [ Edition: fifth ] Publisher: Prentice Hall Pub Date: 3/16/2013 Binding: Paperback Pages: 448.

Ships from: College Park, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$101.93
Seller since 2014

Feedback rating:

(0)

Condition: New
0133370437 Premium Publisher Direct Books are Like New or Brand New books direct from the publisher sometimes at a discount. Multiple copies are usually available. These books ... are not available for expedited shipping and may take up to 14 business days to receive. Read more Show Less

Ships from: Woodland Hills, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Express, 48 States
$107.03
Seller since 2014

Feedback rating:

(31)

Condition: New
PAPERBACK New 0133370437 Premium Publisher Direct Books are Like New or Brand New books direct from the publisher sometimes at a discount. Multiple copies are usually ... available. These books are not available for expedited shipping and may take up to 14 business days to receive. Read more Show Less

Ships from: Tarzana, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 2
Showing 1 – 10 of 13 (2 pages)
Close
Sort by

Overview

Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist).

A practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards , Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.

Read More Show Less

Product Details

  • ISBN-13: 9780133370430
  • Publisher: Prentice Hall
  • Publication date: 3/20/2013
  • Edition description: New Edition
  • Edition number: 5
  • Pages: 448
  • Sales rank: 365,770
  • Product dimensions: 6.90 (w) x 9.00 (h) x 0.70 (d)

Meet the Author

Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia.

He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.

Read More Show Less

Table of Contents

Online Resources
Preface
About the Author

Chapter 1 Introduction

1.1 Computer Security Concepts

1.2 The OSI Security Architecture

1.3 Security Attacks

1.4 Security Services

1.5 Security Mechanisms

1.6 A Model for Network Security

1.7 Standards

1.8 Outline of This Book

1.9 Recommended Reading

1.10 Internet and Web Resources

1.11 Key Terms, Review Questions, and Problems

PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality

2.1 Symmetric Encryption Principles

2.2 Symmetric Block Encryption Algorithms

2.3 Random and Pseudorandom Numbers

2.4 Stream Ciphers and RC4

2.5 Cipher Block Modes of Operation

2.6 Recommended Reading

2.7 Key Terms, Review Questions, and Problems

Chapter 3 Public-Key Cryptography and Message Authentication

3.1 Approaches to Message Authentication

3.2 Secure Hash Functions

3.3 Message Authentication Codes

3.4 Public Key Cryptography Principles

3.5 Public-Key Cryptography Algorithms

3.6 Digital Signatures

3.7 Recommended Reading

3.8 Key Terms, Review Questions, and Problems

PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Key Distribution and User Authentication

4.1 Symmetric Key Distribution Using Symmetric Encryption

4.2 Kerberos

4.3 Key Distribution Using Asymmetric Encryption

4.4 X.509 Certificates

4.5 Public Key Infrastructure

4.6 Federated Identity Management

4.7 Recommended Reading

4.8 Key Terms, Review Questions, and Problems

Chapter 5 Network Access Control and Cloud Security

5.1 Network Access Control

5.2 Extensible Authentication Protocol

5.3 IEEE 802.1X Port-Based Network Access Control

5.4 Cloud Computing

5.5 Cloud Security Risks and Countermeasures

5.6 Data Protection in the Cloud

5.7 Cloud Security as a Service

5.8 Recommended Reading

5.9 Key Terms, Review Questions, and Problems

Chapter 6 Transport-Level Security

6.1 Web Security Issues

6.2 Secure Sockets Layer (SSL)

6.3 Transport Layer Security (TLS)

6.4 HTTPS

6.5 Secure Shell (SSH)

6.6 Recommended Reading

6.7 Key Terms, Review Questions, and Problems

Chapter 7 Wireless Network Security

7.1 Wireless Security

7.2 Mobile Device Security

7.3 IEEE 802.11 Wireless LAN Overview

7.4 IEEE 802.11i Wireless LAN Security

7.5 Recommended Reading

7.6 Key Terms, Review Questions, and Problems

Chapter 8 Electronic Mail Security

8.1 Pretty Good Privacy (PGP)

8.2 S/MIME

8.3 DomainKeys Identified Mail (DKIM)

8.4 Recommended Web Sites

8.5 Key Terms, Review Questions, and Problems

Chapter 9 IP Security

9.1 IP Security Overview

9.2 IP Security Policy

9.3 Encapsulating Security Payload

9.4 Combining Security Associations

9.5 Internet Key Exchange

9.6 Cryptographic Suites

9.7 Recommended Reading

9.8 Key Terms, Review Questions, and Problems

PART THREE SYSTEM SECURITY
Chapter 10 Malicious Software

10.1 Types of Malicious Software

10.2 Propagation – Infected Content - Viruses

10.3 Propagation – Vulnerability Exploit - Worms

10.4 Propagation – Social Engineering – SPAM, Trojans

10.5 Payload – System Corruption

10.6 Payload – Attack Agent – Zombie, Bots

10.7 Payload – Information Theft – Keyloggers, Phishing, Spyware

10.8 Payload – Stealthing – Backdoors, Rootkits

10.9 Countermeasures

10.10 Distributed Denial of Service Attacks

10.11 Recommended Reading

10.12 Key Terms, Review Questions, and Problems

Chapter 11 Intruders

11.1 Intruders

11.2 Intrusion Detection

11.3 Password Management

11.4 Recommended Reading

11.5 Key Terms, Review Questions, and Problems

Chapter 12 Firewalls

12.1 The Need for Firewalls

12.2 Firewall Characteristics

12.3 Types of Firewalls

12.4 Firewall Basing

12.5 Firewall Location and Configurations

12.6 Recommended Reading

12.7 Key Terms, Review Questions, and Problems

APPENDICES
Appendix A Some Aspects of Number Theory

A.1 Prime and Relatively Prime Numbers

A.2 Modular Arithmetic

Appendix B Projects for Teaching Network Security

B.1 Research Projects

B.2 Hacking Project

B.3 Programming Projects

B.4 Laboratory Exercises

B.5 Practical Security Assessments

B.6 Writing Assignments

B.7 Reading/Report Assignments

REFERENCES
INDEX

ONLINE CHAPTERS AND APPENDICES - Online chapters, appendices, and other documents are Premium Content. Students must use the access card located in the front of the book to register and access the online premium content. If there is no access card, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.” Instructors must register on the site to access the material.
Chapter 13 Network Management Security

13.1 Basic Concepts of SNMP

13.2 SNMPv1 Community Facility

13.3 SNMPv3

13.4 Recommended Reading

13.5 Key Terms, Review Questions, and Problems

Chapter 14 Legal and Ethical Issues

14.1 Cybercrime and Computer Crime

14.2 Intellectual Property

14.3 Privacy

14.4 Ethical Issues

14.5 Recommended Reading

14.6 Key Terms, Review Questions, and Problems

Chapter 15 SHA-3

15.1 Evaluation Criteria for SHA-3

15.2 The SHA-3 Algorithm

15.3 Recommended Reading

15.4 Key Terms and Review Questions

Appendix C Standards and Standards-Setting Organizations

C.1 The Importance of Standards

C.2 Internet Standards and the Internet Society

C.3 National Institute of Standards and Technology

Appendix D TCP/IP and OSI

D.1 Protocols and Protocol Architectures

D.2 The TCP/IP Protocol Architecture

D.3 The Role of an Internet Protocol

D.4 IPv4

D.5 IPv6

D.6 The OSI Protocol Architecture

Appendix E Pseudorandom Number Generation

E.1 PRNG Requirements

E.2 PRNG Using a Block Cipher

E.3 PRNG Using a Hash Function or Message Authentication Code

Appendix F Kerberos Encryption Techniques

F.1 Password-to-Key Transformation

F.2 Propagating Cipher Block Chaining Mode

Appendix G Data Compression Using ZIP

G.1 Compression Algorithm

G.2 Decompression Algorithm

Appendix H More on PGP

H.1 True Random Numbers

H.2 Pseudorandom Numbers

H.3 Cryptographic Keys and Key Rings

H.4 Public-Key Management

Appendix I The International Reference Alphabet
Appendix J The Base-Rate Fallacy
Appendix K Radix-64 Conversion
GLOSSARY
LIST OF ACRONYMS

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)