My Account Log in

3 options

Introduction to network security : theory and practice / Jie Wang, Zachary A. Kissel.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Wang, Jie, 1961- author.
Kissel, Zachary A., author.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Physical Description:
1 online resource (440 p.)
Edition:
Second edition.
Place of Publication:
Singapore : Wiley, 2015.
Language Note:
English
System Details:
text file
Summary:
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect new developments in network security Introduces a chapter on Cloud security, a very popular and essential topic Uses everyday examples that most computer users experience to illustrate important principles and mechanisms Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec
Contents:
Cover; Title Page; Copyright; Contents; Preface; About the Authors; Chapter 1 Network Security Overview; 1.1 Mission and Definitions; 1.2 Common Attacks and Defense Mechanisms; 1.2.1 Eavesdropping; 1.2.2 Cryptanalysis; 1.2.3 Password Pilfering; 1.2.4 Identity Spoofing; 1.2.5 Buffer-Overflow Exploitations; 1.2.6 Repudiation; 1.2.7 Intrusion; 1.2.8 Traffic Analysis; 1.2.9 Denial of Service Attacks; 1.2.10 Malicious Software; 1.3 Attacker Profiles; 1.3.1 Hackers; 1.3.2 Script Kiddies; 1.3.3 Cyber Spies; 1.3.4 Vicious Employees; 1.3.5 Cyber Terrorists; 1.3.6 Hypothetical Attackers
1.4 Basic Security Model1.5 Security Resources; 1.5.1 CERT; 1.5.2 SANS Institute; 1.5.3 Microsoft Security; 1.5.4 NTBugtraq; 1.5.5 Common Vulnerabilities and Exposures; 1.6 Closing Remarks; 1.7 Exercises; 1.7.1 Discussions; 1.7.2 Homework; Chapter 2 Data Encryption Algorithms; 2.1 Data Encryption Algorithm Design Criteria; 2.1.1 ASCII Code; 2.1.2 XOR Encryption; 2.1.3 Criteria of Data Encryptions; 2.1.4 Implementation Criteria; 2.2 Data Encryption Standard; 2.2.1 Feistel's Cipher Scheme; 2.2.2 DES Subkeys; 2.2.3 DES Substitution Boxes; 2.2.4 DES Encryption
2.2.5 DES Decryption and Correctness Proof2.2.6 DES Security Strength; 2.3 Multiple DES; 2.3.1 Triple-DES with Two Keys; 2.3.2 2DES and 3DES/3; 2.3.3 Meet-in-the-Middle Attacks on 2DES; 2.4 Advanced Encryption Standard; 2.4.1 AES Basic Structures; 2.4.2 AES S-Boxes; 2.4.3 AES-128 Round Keys; 2.4.4 Add Round Keys; 2.4.5 Substitute-Bytes; 2.4.6 Shift-Rows; 2.4.7 Mix-Columns; 2.4.8 AES-128 Encryption; 2.4.9 AES-128 Decryption and Correctness Proof; 2.4.10 Galois Fields; 2.4.11 Construction of the AES S-Box and Its Inverse; 2.4.12 AES Security Strength
2.5 Standard Block Cipher Modes of Operations2.5.1 Electronic-Codebook Mode; 2.5.2 Cipher-Block-Chaining Mode; 2.5.3 Cipher-Feedback Mode; 2.5.4 Output-Feedback Mode; 2.5.5 Counter Mode; 2.6 Offset Codebook Mode of Operations; 2.6.1 Basic Operations; 2.6.2 OCB Encryption and Tag Generation; 2.6.3 OCB Decryption and Tag Verification; 2.7 Stream Ciphers; 2.7.1 RC4 Stream Cipher; 2.7.2 RC4 Security Weaknesses; 2.8 Key Generations; 2.8.1 ANSI X9.17 PRNG; 2.8.2 BBS Pseudorandom Bit Generator; 2.9 Closing Remarks; 2.10 Exercises; 2.10.1 Discussions; 2.10.2 Homework
Chapter 3 Public-Key Cryptography and Key Management3.1 Concepts of Public-Key Cryptography; 3.2 Elementary Concepts and Theorems in Number Theory; 3.2.1 Modular Arithmetic and Congruence Relations; 3.2.2 Modular Inverse; 3.2.3 Primitive Roots; 3.2.4 Fast Modular Exponentiation; 3.2.5 Finding Large Prime Numbers; 3.2.6 The Chinese Remainder Theorem; 3.2.7 Finite Continued Fractions; 3.3 Diffie-Hellman Key Exchange; 3.3.1 Key Exchange Protocol; 3.3.2 Man-in-the-Middle Attacks; 3.3.3 Elgamal PKC; 3.4 RSA Cryptosystem; 3.4.1 RSA Key Pairs, Encryptions, and Decryptions
3.4.2 RSA Parameter Attacks
Notes:
Description based upon print version of record.
Includes bibliographical refererences and index.
Description based on print version record.
ISBN:
9781118939505
1118939506
9781119113102
1119113105
9781118939499
1118939492
OCLC:
911135225

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account