Network Security Essentials : Applications and Standards / Edition 1

Network Security Essentials : Applications and Standards / Edition 1

by William Stallings
ISBN-10:
0130160938
ISBN-13:
9780130160935
Pub. Date:
11/23/1999
Publisher:
Pearson Education

Hardcover - Rent for

Select a Purchase Option (Older Edition)
  • purchase options

Temporarily Out of Stock Online


Overview

Network Security Essentials : Applications and Standards / Edition 1

As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking.

Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security.

Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features.

  • Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET.
  • Chapters on Web security and network management security (SNMPv3).
  • Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.
  • On-line transparency masters, an Internet mailing list, and links to relevant Web sites are available at <...

Product Details

ISBN-13: 9780130160935
Publisher: Pearson Education
Publication date: 11/23/1999
Edition description: Older Edition
Pages: 366
Product dimensions: 7.00(w) x 9.16(h) x 0.71(d)

Table of Contents

Preface xi
Introduction
1(18)
Attacks, Services, and Mechanisms
4(2)
Security Attacks
6(3)
Security Services
9(2)
A Model for Internetwork Security
11(2)
Internet Standards and RFCs
13(3)
Recommended Reading
16(3)
Appendix 1A: Internet and Web Resources
16(3)
PART ONE CRYPTOGRAPHY 19(62)
Conventional Encryption and Message Confidentiality
21(26)
Conventional Encryption Principles
22(6)
Conventional Encryption Algorithms
28(9)
Cipher Block Modes of Operation
37(2)
Location of Encryption Devices
39(3)
Key Distribution
42(2)
Recommended Reading
44(1)
Problems
44(3)
Public-Key Cryptography and Message Authentication
47(34)
Approaches to Message Authentication
48(4)
Secure Hash Functions and HMAC
52(10)
Public Key Cryptography Principles
62(4)
Public-Key Cryptography Algorithms
66(6)
Digital Signatures
72(1)
Key Management
73(2)
Recommended Reading
75(1)
Problems
75(6)
Appendix 3A: Prime Numbers and Modular Arithmetic
77(4)
PART TWO NETWORK SECURITY APPLICATIONS 81(196)
Authentication Applications
83(34)
Kerberos
84(17)
X.509 Directory Authentication Service
101(9)
Recommended Reading and Web Sites
110(1)
Problems
110(7)
Appendix 4A: Kerberos Encryption Techniques
111(6)
Electronic Mail Security
117(44)
Pretty Good Privacy (PGP)
118(18)
S/MIME
136(16)
Recommended Web Sites
152(1)
Problems
152(9)
Appendix 5A: Data Compression Using ZIP
153(2)
Appendix 5B: Radix-64 Conversion
155(2)
Appendix 5C: PGP Random Number Generation
157(4)
IP Security
161(42)
IP Security Overview
162(3)
IP Security Architecture
165(6)
Authentication Header
171(5)
Encapsulating Security Payload
176(5)
Combining Security Associations
181(3)
Key Management
184(9)
Recommended Reading and Web Sites
193(1)
Problems
194(9)
Appendix 6A: Internetworking and Internet Protocols
194(9)
Web Security
203(34)
Web Security Requirements
204(2)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
206(17)
Secure Electronic Transaction (SET)
223(12)
Recommended Reading and Web Sites
235(1)
Problems
235(2)
Network Management Security
237(40)
Basic Concepts of SNMP
238(8)
SNMPv1 Community Facility
246(2)
SNMPv3
248(25)
Recommended Reading and Web Sites
273(1)
Problems
274(3)
PART THREE SYSTEM SECURITY 277(60)
Intruders and Viruses
279(40)
Intruders
280(23)
Viruses and Related Threats
303(13)
Recommended Reading and Web Sites
316(1)
Problems
317(2)
Firewalls
319(18)
Firewall Design Principles
320(10)
Trusted Systems
330(6)
Recommended Reading
336(1)
Problems
336(1)
APPENDIX A RFCs Cited in this Book 337(2)
APPENDIX B Projects for Teaching Network Security 339(2)
B.1 Research Projects
339(1)
B.2 Programming Projects
340(1)
B.3 Reading/Report Assignments
340(1)
Glossary 341(6)
References 347(6)
Index 353

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews