did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780132380331

Network Security Essentials : Applications and Standards

by
  • ISBN13:

    9780132380331

  • ISBN10:

    0132380331

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2011-01-01
  • Publisher: Prentice Hall
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $79.00

Summary

Network Security Essentials, Third Edition is a thorough, up-to-date introduction to the deterrence, prevention, detection, and correction of security violations involving information delivery across networks and the Internet.

Table of Contents

Preface xiii
Introduction
1(25)
Security Trends
4(2)
The OSI Security Architecture
6(1)
Security Attacks
7(4)
Security Services
11(3)
Security Mechanisms
14(3)
A Model for Internetwork Security
17(2)
Internet Standards the Internet Society
19(3)
Outline of This Book
22(1)
Recommended Reading
23(1)
Internet and Web Resources
23(2)
Key Terms, Review Questions, and Problems
25(1)
PART ONE CRYPTOGRAPHY
26(66)
Symmetric Encryption and Message Confidentiality
28(31)
Symmetric Encryption Principles
29(6)
Symmetric Block Encryption Algorithms
35(8)
Stream Ciphers and RC4
43(3)
Cipher Block Modes of Operation
46(5)
Location of Encryption Devices
51(1)
Key Distribution
52(3)
Recommended Reading and Web Sites
55(1)
Key Terms, Review Questions, and Problems
56(3)
Public-Key Cryptography and Message Authentication
59(33)
Approaches to Message Authentication
60(4)
Secure Hash Functions and HMAC
64(10)
Public Key Cryptography Principles
74(4)
Public-Key Cryptography Algorithms
78(7)
Digital Signatures
85(1)
Key Management
85(2)
Recommended Reading and Web Sites
87(1)
Key Terms, Review Questions, and Problems
88(4)
PART TWO NETWORK SECURITY APPLICATIONS
92(205)
Authentication Applications
94(36)
Kerberos
95(18)
X.509 Directory Authentication Service
113(9)
Public Key Infrastructure
122(2)
Recommended Reading and Web Sites
124(1)
Key Terms, Review Questions, and Problems
125(5)
Appendix 4A: Kerberos Encryption Techniques
127(3)
Electronic Mail Security
130(47)
Pretty Good Privacy (PGP)
132(19)
S/MIME
151(17)
Recommended Web Sites
168(1)
Key Terms, Review Questions, and Problems
168(9)
Appendix 5A: Data Compression Using ZIP
169(3)
Appendix 5B: Radix-64 Conversion
172(1)
Appendix 5C: PGP Random Number Generation
173(4)
IP Security
177(44)
IP Security Overview
179(2)
IP Security Architecture
181(6)
Authentication Header
187(5)
Encapsulating Security Payload
192(5)
Combining Security Associations
197(3)
Key Management
200(10)
Recommended Reading and Web Sites
210(1)
Key Terms, Review Questions, and Problems
211(10)
Appendix 6A: Internetworking and Internet Protocols
212(9)
Web Security
221(36)
Web Security Requirements
222(3)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
225(18)
Secure Electronic Transaction (SET)
243(11)
Recommended Reading and Web Sites
254(1)
Key Terms, Review Questions, and Problems
255(2)
Network Management Security
257(40)
Basic Concepts of SNMP
258(8)
SNMPv1 Community Facility
266(3)
SNMPv3
269(23)
Recommended Reading and Web Sites
292(1)
Key Terms, Review Questions, and Problems
293(4)
PART THREE SYSTEM SECURITY
297(84)
Intruders
299(33)
Intruders
301(3)
Intrusion Detection
304(12)
Password Management
316(9)
Recommended Reading and Web Sites
325(1)
Key Terms, Review Questions, and Problems
326(6)
Appendix 9A: The Base-Rate Fallacy
328(4)
Malicious Software
332(23)
Viruses and Related Threats
333(11)
Virus Countermeasures
344(4)
Distributed Denial of Service Attacks
348(5)
Recommended Reading and Web Sites
353(1)
Key Terms, Review Questions, and Problems
354(1)
Firewalls
355(26)
Firewall Design Principles
356(12)
Trusted Systems
368(6)
Common Criteria for Information Technology Security Evaluation
374(4)
Recommended Reading and Web Sites
378(1)
Key Terms, Review Questions, and Problems
379(2)
APPENDICES
381(9)
Appendix A Some Aspects of Number Theory
381(5)
Prime and Relatively Prime Numbers
382(2)
Modular Arithmetic
384(2)
Appendix B Projects for Teaching Network Security
386(4)
Research Projects
387(1)
Programming Projects
388(1)
Laboratory Exercises
388(1)
Writing Assignments
388(1)
Reading/Report Assignments
389(1)
Glossary 390(6)
References 396(6)
Index 402

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program