Network security essentials : applications and standards / William Stallings.
- Format:
-
- Author/Creator:
-
- Contributor:
-
- Language:
- English
- Subjects (All):
-
- Physical Description:
- xv, 409 pages : illustrations ; 24 cm
- Edition:
- Second edition.
- Place of Publication:
- Upper Saddle River, NJ : Pearson Education, [2003]
- Summary:
- It's no longer an option. Network security is essential to every corporation, organization, institution, and small business on the planet. Anyone working in IT or other computer-related professions must know the practical applications and standards for enforcing network security. Whether student, professor, or industry professional, this book will provide you with the most up-to-date, comprehensive coverage of vital internet-based security tools and applications. Organized to provide critical information in the optimal sequence for classroom instruction and self-study, this book also serves as a useful reference for practicing system engineers, programmers, system managers, network managers, product marketers, system support specialists and other professionals.
- Contents:
-
- 1.1 The OSI Security Architecture 4
- 1.2 Security Attacks 5
- 1.3 Security Services 9
- 1.4 Security Mechanisms 13
- 1.5 A Model for Network Security 13
- 1.6 Internet Standards and the Internet Society 17
- 1.7 Outline of This Book 21
- 1.9 Internet and Web Resources 22
- Part 1 Cryptography 25
- Chapter 2 Symmetric Encryption and Message Confidentiality 27
- 2.1 Symmetric Encryption Principles 28
- 2.2 Symmetric Encryption Algorithms 34
- 2.3 Cipher Block Modes of Operation 44
- 2.4 Location of Encryption Devices 47
- 2.5 Key Distribution 49
- Chapter 3 Public-Key Cryptography and Message Authentication 53
- 3.1 Approaches to Message Authentication 54
- 3.2 Secure Hash Functions and HMAC 58
- 3.3 Public-Key Cryptography Principles 68
- 3.4 Public-Key Cryptography Algorithms 72
- 3.5 Digital Signatures 78
- 3.6 Key Management 79
- Part 2 Network Security Applications 85
- Chapter 4 Authentication Applications 87
- 4.1 Kerberos 88
- 4.2 X.509 Authentication Service 105
- Appendix 4A Kerberos Encryption Techniques 117
- Chapter 5 Electronic Mail Security 121
- 5.1 Pretty Good Privacy 122
- 5.2 S/MIME 141
- Appendix 5A Data Compression Using Zip 159
- Appendix 5B RADIX-64 Conversion 162
- Appendix 5C PGP Random Number Generation 164
- Chapter 6 IP Security 167
- 6.1 IP Security Overview 168
- 6.2 IP Security Architecture 171
- 6.3 Authentication Header 177
- 6.4 Encapsulating Security Payload 182
- 6.5 Combining Security Associations 187
- 6.6 Key Management 190
- Appendix 6A Internetworking and Internet Protocols 203
- Chapter 7 Web Security 213
- 7.2 Secure Socket Layer and Transport Layer Security 217
- 7.3 Secure Electronic Transaction 234
- Chapter 8 Network Management Security 249
- 8.1 Basic Concepts of SNMP 250
- 8.2 SNMPv1 Community Facility 258
- 8.3 SNMPv3 261
- Part 3 System Security 291
- Chapter 9 Intruders 293
- 9.2 Intrusion Detection 297
- 9.3 Password Management 309
- Appendix 9A The Base-Rate Fallacy 322
- Chapter 10 Malicious Software 325
- 10.1 Viruses and Related Threats 326
- 10.2 Virus Countermeasures 337
- Chapter 11 Firewalls 343
- 11.1 Firewall Design Principles 344
- 11.2 Trusted Systems 356
- Appendix A Standards Cited in This Book 365
- A.1 ANSI Standards 365
- A.2 Internet RFGs 365
- A.3 ITU-T Recommendations 366
- A.4 NIST Federal Information Processing Standards 367
- Appendix B Some Aspects of Number Theory 369
- B.1 Prime and Relatively Prime Numbers 370
- B.2 Modular Arithmetic 372.
- Notes:
- Includes bibliographical references (pages [381]-387) and index.
- Local Notes:
- Acquired for the Penn Libraries with assistance from the John G. Hartman Memorial Library Fund.
- ISBN:
- 0130351288
- OCLC:
- 50725678
- Online:
- The John G. Hartman Memorial Library Fund Home Page
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.