Network Security Essentials : Applications and Standards

by
Edition: 3rd
Format: Paperback
Pub. Date: 2011-01-01
Publisher(s): Prentice Hall
List Price: $84.53

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Network Security Essentials, Third Edition is a thorough, up-to-date introduction to the deterrence, prevention, detection, and correction of security violations involving information delivery across networks and the Internet.

Table of Contents

Preface xiii
Introduction
1(25)
Security Trends
4(2)
The OSI Security Architecture
6(1)
Security Attacks
7(4)
Security Services
11(3)
Security Mechanisms
14(3)
A Model for Internetwork Security
17(2)
Internet Standards the Internet Society
19(3)
Outline of This Book
22(1)
Recommended Reading
23(1)
Internet and Web Resources
23(2)
Key Terms, Review Questions, and Problems
25(1)
PART ONE CRYPTOGRAPHY
26(66)
Symmetric Encryption and Message Confidentiality
28(31)
Symmetric Encryption Principles
29(6)
Symmetric Block Encryption Algorithms
35(8)
Stream Ciphers and RC4
43(3)
Cipher Block Modes of Operation
46(5)
Location of Encryption Devices
51(1)
Key Distribution
52(3)
Recommended Reading and Web Sites
55(1)
Key Terms, Review Questions, and Problems
56(3)
Public-Key Cryptography and Message Authentication
59(33)
Approaches to Message Authentication
60(4)
Secure Hash Functions and HMAC
64(10)
Public Key Cryptography Principles
74(4)
Public-Key Cryptography Algorithms
78(7)
Digital Signatures
85(1)
Key Management
85(2)
Recommended Reading and Web Sites
87(1)
Key Terms, Review Questions, and Problems
88(4)
PART TWO NETWORK SECURITY APPLICATIONS
92(205)
Authentication Applications
94(36)
Kerberos
95(18)
X.509 Directory Authentication Service
113(9)
Public Key Infrastructure
122(2)
Recommended Reading and Web Sites
124(1)
Key Terms, Review Questions, and Problems
125(5)
Appendix 4A: Kerberos Encryption Techniques
127(3)
Electronic Mail Security
130(47)
Pretty Good Privacy (PGP)
132(19)
S/MIME
151(17)
Recommended Web Sites
168(1)
Key Terms, Review Questions, and Problems
168(9)
Appendix 5A: Data Compression Using ZIP
169(3)
Appendix 5B: Radix-64 Conversion
172(1)
Appendix 5C: PGP Random Number Generation
173(4)
IP Security
177(44)
IP Security Overview
179(2)
IP Security Architecture
181(6)
Authentication Header
187(5)
Encapsulating Security Payload
192(5)
Combining Security Associations
197(3)
Key Management
200(10)
Recommended Reading and Web Sites
210(1)
Key Terms, Review Questions, and Problems
211(10)
Appendix 6A: Internetworking and Internet Protocols
212(9)
Web Security
221(36)
Web Security Requirements
222(3)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
225(18)
Secure Electronic Transaction (SET)
243(11)
Recommended Reading and Web Sites
254(1)
Key Terms, Review Questions, and Problems
255(2)
Network Management Security
257(40)
Basic Concepts of SNMP
258(8)
SNMPv1 Community Facility
266(3)
SNMPv3
269(23)
Recommended Reading and Web Sites
292(1)
Key Terms, Review Questions, and Problems
293(4)
PART THREE SYSTEM SECURITY
297(84)
Intruders
299(33)
Intruders
301(3)
Intrusion Detection
304(12)
Password Management
316(9)
Recommended Reading and Web Sites
325(1)
Key Terms, Review Questions, and Problems
326(6)
Appendix 9A: The Base-Rate Fallacy
328(4)
Malicious Software
332(23)
Viruses and Related Threats
333(11)
Virus Countermeasures
344(4)
Distributed Denial of Service Attacks
348(5)
Recommended Reading and Web Sites
353(1)
Key Terms, Review Questions, and Problems
354(1)
Firewalls
355(26)
Firewall Design Principles
356(12)
Trusted Systems
368(6)
Common Criteria for Information Technology Security Evaluation
374(4)
Recommended Reading and Web Sites
378(1)
Key Terms, Review Questions, and Problems
379(2)
APPENDICES
381(9)
Appendix A Some Aspects of Number Theory
381(5)
Prime and Relatively Prime Numbers
382(2)
Modular Arithmetic
384(2)
Appendix B Projects for Teaching Network Security
386(4)
Research Projects
387(1)
Programming Projects
388(1)
Laboratory Exercises
388(1)
Writing Assignments
388(1)
Reading/Report Assignments
389(1)
Glossary 390(6)
References 396(6)
Index 402

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.