did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780130160935

Network Security Essentials

by
  • ISBN13:

    9780130160935

  • ISBN10:

    0130160938

  • Format: Paperback
  • Copyright: 1999-11-01
  • Publisher: Prentice Hall
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $45.00 Save up to $0.22
  • Buy New
    $44.78
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-3 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

For one-semester courses on Network Security for computer science, engineering, and CIS majors. This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise section on the discipline of cryptographycovering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange.

Author Biography

William Stallings is a best-selling author and five-time winner of the annual Text and Academic Authors Association award for best computer science and engineering text. He has authored 17 titles and -- counting revised editions -- 43 books on various aspects of computer networking and computer architecture. Stallings is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He holds a Ph.D. from M.I.T. in computer science and a B.S. from Notre Dame in electrical engineering

Table of Contents

Preface xi
Introduction
1(18)
Attacks, Services, and Mechanisms
4(2)
Security Attacks
6(3)
Security Services
9(2)
A Model for Internetwork Security
11(2)
Internet Standards and RFCs
13(3)
Recommended Reading
16(3)
Appendix 1A: Internet and Web Resources
16(3)
PART ONE CRYPTOGRAPHY 19(62)
Conventional Encryption and Message Confidentiality
21(26)
Conventional Encryption Principles
22(6)
Conventional Encryption Algorithms
28(9)
Cipher Block Modes of Operation
37(2)
Location of Encryption Devices
39(3)
Key Distribution
42(2)
Recommended Reading
44(1)
Problems
44(3)
Public-Key Cryptography and Message Authentication
47(34)
Approaches to Message Authentication
48(4)
Secure Hash Functions and HMAC
52(10)
Public Key Cryptography Principles
62(4)
Public-Key Cryptography Algorithms
66(6)
Digital Signatures
72(1)
Key Management
73(2)
Recommended Reading
75(1)
Problems
75(6)
Appendix 3A: Prime Numbers and Modular Arithmetic
77(4)
PART TWO NETWORK SECURITY APPLICATIONS 81(196)
Authentication Applications
83(34)
Kerberos
84(17)
X.509 Directory Authentication Service
101(9)
Recommended Reading and Web Sites
110(1)
Problems
110(7)
Appendix 4A: Kerberos Encryption Techniques
111(6)
Electronic Mail Security
117(44)
Pretty Good Privacy (PGP)
118(18)
S/MIME
136(16)
Recommended Web Sites
152(1)
Problems
152(9)
Appendix 5A: Data Compression Using ZIP
153(2)
Appendix 5B: Radix-64 Conversion
155(2)
Appendix 5C: PGP Random Number Generation
157(4)
IP Security
161(42)
IP Security Overview
162(3)
IP Security Architecture
165(6)
Authentication Header
171(5)
Encapsulating Security Payload
176(5)
Combining Security Associations
181(3)
Key Management
184(9)
Recommended Reading and Web Sites
193(1)
Problems
194(9)
Appendix 6A: Internetworking and Internet Protocols
194(9)
Web Security
203(34)
Web Security Requirements
204(2)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
206(17)
Secure Electronic Transaction (SET)
223(12)
Recommended Reading and Web Sites
235(1)
Problems
235(2)
Network Management Security
237(40)
Basic Concepts of SNMP
238(8)
SNMPv1 Community Facility
246(2)
SNMPv3
248(25)
Recommended Reading and Web Sites
273(1)
Problems
274(3)
PART THREE SYSTEM SECURITY 277(60)
Intruders and Viruses
279(40)
Intruders
280(23)
Viruses and Related Threats
303(13)
Recommended Reading and Web Sites
316(1)
Problems
317(2)
Firewalls
319(18)
Firewall Design Principles
320(10)
Trusted Systems
330(6)
Recommended Reading
336(1)
Problems
336(1)
APPENDIX A RFCs Cited in this Book 337(2)
APPENDIX B Projects for Teaching Network Security 339(2)
B.1 Research Projects
339(1)
B.2 Programming Projects
340(1)
B.3 Reading/Report Assignments
340(1)
Glossary 341(6)
References 347(6)
Index 353

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program