Network Security Essentials: Applications and Standards / Edition 4

Paperback (Print)
Rent
Rent from BN.com
$15.23
(Save 83%)
Est. Return Date: 06/19/2014
Buy Used
Buy Used from BN.com
$68.85
(Save 25%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $3.00
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (14) from $3.00   
  • New (3) from $18.95   
  • Used (11) from $3.00   
Close
Sort by
Page 1 of 2
Showing 1 – 10 of 14 (2 pages)
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$3.00
Seller since 2013

Feedback rating:

(8)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Acceptable
Acceptable 4th Edition. Pre-loved books for the budget-conscious consumer. With more than 50 years' experience, we aim to please with immediate shipping and fast, friendly ... service. All orders ship on the same or next business day. Will send best available copy. We cannot guarantee supplemental materials such as CDs or access codes will be available or unused. Read more Show Less

Ships from: Murray, KY

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$3.60
Seller since 2009

Feedback rating:

(3275)

Condition: Good
Ships same day or next business day! UPS expedited shipping available (Priority Mail for AK/HI/APO/PO Boxes). Used sticker & some writing and/or highlighting. Used books may not ... include working access code or dust jacket Read more Show Less

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$3.60
Seller since 2011

Feedback rating:

(309)

Condition: Good
... .. Quality text from a reliable seller. Speedy service! Choose EXPEDITED for fastest shipping!

Ships from: Edmond, OK

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$4.90
Seller since 2008

Feedback rating:

(433)

Condition: Good
2010 Paperback Light interior markings. Good reading copy. Light wear. All items shipped to US include delivery confirmation. Thanks for looking!

Ships from: Raleigh, NC

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$14.47
Seller since 2014

Feedback rating:

(48)

Condition: Very Good
0136108059 Very Good! May NOT contain supplemental materials such as CD's, info-trac, access codes, etc... May contain bookstore stickers. Satisfaction Guaranteed! Choose ... Expedited Shipping for fastest delivery! Free USPS Tracking Number. Read more Show Less

Ships from: Lexington, KY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$14.47
Seller since 2010

Feedback rating:

(51)

Condition: Very Good
PAPERBACK Very Good 0136108059 Very Good! May NOT contain supplemental materials such as CD's, info-trac, access codes, etc...May contain bookstore stickers. Satisfaction ... Guaranteed! Choose Expedited Shipping for fastest delivery! Free USPS Tracking Number. Read more Show Less

Ships from: Lexington, KY

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$18.95
Seller since 2009

Feedback rating:

(132)

Condition: New
0136108059 New softcover book. FOURTH EDITION. DAILY SHIPPING!

Ships from: Kalamazoo, MI

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$20.95
Seller since 2014

Feedback rating:

(0)

Condition: Good

Ships from: Nashville, TN

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
$27.92
Seller since 2013

Feedback rating:

(84)

Condition: Very Good
PAPERBACK Very Good 0136108059 covers and corners may show shelf wear used books may be missing software and or codes. spirals will show more wear because of nature of book.

Ships from: Atlanta, GA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$30.99
Seller since 2014

Feedback rating:

(27)

Condition: Good
Buy with Confidence. Excellent Customer Support. We ship from multiple US locations. No CD, DVD or Access Code Included.

Ships from: Fort Mill, SC

Usually ships in 1-2 business days

  • Standard, 48 States
Page 1 of 2
Showing 1 – 10 of 14 (2 pages)
Close
Sort by

Overview

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

Read More Show Less

Product Details

  • ISBN-13: 9780136108054
  • Publisher: Prentice Hall
  • Publication date: 3/26/2010
  • Edition description: Older Edition
  • Edition number: 4
  • Pages: 432
  • Product dimensions: 6.90 (w) x 9.00 (h) x 0.80 (d)

Meet the Author

William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 35 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.

He has received the prize for best Computer Science and Engineering textbook of the year from the Textbook and Academic Authors Association six times.

Bill has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

Dr. Stallings holds a Ph.D. from M.I.T. in Computer Science and a B.S. from Notre Dame in Electrical Engineering.

Read More Show Less

Read an Excerpt

PREFACE:

Preface

In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

Objectives

It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed.

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study.

Plan of the Book

The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i report underlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh

Internet Services for Instructors and Students

There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...
Read More Show Less

Table of Contents

About the Author

Preface

Chapter 1 Introduction

1.1 Computer Security Concepts

1.2 The OSI Security Architecture

1.3 Security Attacks

1.4 Security Services

1.5 Security Mechanisms

1.6 A Model for Network Security

1.7 Standards

1.8 Outline of This Book

1.9 Recommended Reading

1.10 Internet and Web Resources

1.11 Key Terms, Review Questions, and Problems

PART ONE CRYPTOGRAPHY

Chapter 2 Symmetric Encryption and Message Confidentiality

2.1 Symmetric Encryption Principles

2.2 Symmetric Block Encryption Algorithms

2.3 Random and Pseudorandom Numbers

2.4 Stream Ciphers and RC4

2.5 Cipher Block Modes of Operation

2.6 Recommended Reading and Web Sites

2.7 Key Terms, Review Questions, and Problems

Chapter 3 Public-Key Cryptography and Message Authentication

3.1 Approaches to Message Authentication

3.2 Secure Hash Functions

3.3 Message Authentication Codes

3.4 Public Key Cryptography Principles

3.5 Public-Key Cryptography Algorithms

3.6 Digital Signatures

3.7 Recommended Reading and Web Sites

3.8 Key Terms, Review Questions, and Problems

PART TWO NETWORK SECURITY APPLICATIONS

Chapter 4 Key Distribution and User Authentication

4.1 Symmetric Key Distribution Using Symmetric Encryption

4.2 Kerberos

4.3 Key Distribution Using Asymmetric Encryption

4.4 X.509 Certificates

4.5 Public Key Infrastructure

4.6 Federated Identity Management

4.7 Recommended Reading and Web Sites

4.8 Key Terms, Review Questions, and Problems

Chapter 5 Transport-Level Security

5.1 Web Security Issues

5.2 Secure Sockets Layer (SSL)

5.3 Transport Layer Security (TLS)

5.4 HTTPS

5.5 Secure Shell (SSH)

5.6 Recommended Reading and Web Sites

5.7 Key Terms, Review Questions, and Problems

Chapter 6 Wireless Network Security

6.1 IEEE 802.11 Wireless LAN Overview

6.2 IEEE 802.11i Wireless LAN Security

6.3 Wireless Application Protocol Overview

6.4 Wireless Transport Layer Security

6.5 WAP End-to-End Security

6.6 Recommended Reading and Web Sites

6.7 Key Terms, Review Questions, and Problems

Chapter 7 Electronic Mail Security

7.1 Pretty Good Privacy (PGP)

7.2 S/MIME

7.3 DomainKeys Identified Mail (DKIM)

7.4 Recommended Web Sites

7.5 Key Terms, Review Questions, and Problems

Appendix 7A: Radix-64 Conversion

Chapter 8 IP Security

8.1 IP Security Overview

8.2 IP Security Policy

8.3 Encapsulating Security Payload

8.4 Combining Security Associations

8.5 Internet Key Exchange

8.6 Cryptographic Suites

8.7 Recommended Reading and Web Sites

8.8 Key Terms, Review Questions, and Problems

PART THREE SYSTEM SECURITY

Chapter 9 Intruders

9.1 Intruders

9.2 Intrusion Detection

9.3 Password Management

9.4 Recommended Reading and Web Sites

9.5 Key Terms, Review Questions, and Problems

Appendix 9A The Base-Rate Fallacy

Chapter 10 Malicious Software

10.1 Types of Malicious Software

10.2 Viruses

10.3 Virus Countermeasures

10.4 Worms

10.5 Distributed Denial of Service Attacks

10.6 Recommended Reading and Web Sites

10.7 Key Terms, Review Questions, and Problems

Chapter 11 Firewalls

11.1 The Need for Firewalls

11.2 Firewall Characteristics

11.3 Types of Firewalls

11.4 Firewall Basing

11.5 Firewall Location and Configurations

11.6 Recommended Reading and Web Sites

11.7 Key Terms, Review Questions, and Problems

APPENDICES

Appendix A Some Aspects of Number Theory

A.1 Prime and Relatively Prime Numbers

A.2 Modular Arithmetic

Appendix B Projects for Teaching Network Security

B.1 Research Projects

B.2 Hacking Project

B.3 Programming Projects

B.4 Laboratory Exercises

B.5 Practical Security Assessments

B.6 Writing Assignments

B.7 Reading/Report Assignments

ONLINE CHAPTERS

Chapter 12 Network Management Security

12.1 Basic Concepts of SNMP

12.2 SNMPv1 Community Facility

12.3 SNMPv3

12.4 Recommended Reading and Web Sites

12.5 Key Terms, Review Questions, and Problems

Chapter 13 Legal and Ethical Issues

13.1 Cybercrime and Computer Crime

13.2 Intellectual Property

13.3 Privacy

13.4 Ethical Issues

13.5 Recommended Reading and Web Sites

13.6 Key Terms, Review Questions, and Problems

ONLINE APPENDICES

Appendix C Standards and Standards-Setting Organizations

C.1 The Importance of Standards

C.2 Internet Standards and the Internet Society

C.3 National Institute of Standards and Technology

Appendix D TCP/IP and OSI

D.1 Protocols and Protocol Architectures

D.2 The TCP/IP Protocol Architecture

D.3 The Role of an Internet Protocol

D.4 IPv4

D.5 IPv6

D.6 The OSI Protocol Architecture

Appendix E Pseudorandom Number Generation

E.1 PRNG Requirements

E.2 PRNG Using a Block Cipher

E.3 PRNG Using a Hash Function or Message Authentication Code

Appendix F Kerberos Encryption Techniques

F.1 Password-to-Key Transformation

F.2 Propagating Cipher Block Chaining Mode

Appendix G Data Compression Using ZIP

Appendix H PGP Random Number Generation

GLOSSARY

REFERENCES

INDEX

LIST OF ACRONYMS

Read More Show Less

Preface

PREFACE:

Preface

In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

Objectives

It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed.

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study.

Plan of the Book

The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i reportunderlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh

Internet Services for Instructors and Students

There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)