50
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Featured Preorders
    • Award Winners
    • Audio Books
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Month
    • Bookseller Displays
    • 50 Books for 50 Years
    • 25 Best 21st Century Sci-Fi & Fantasy
    • 25 PNW Books to Read Before You Die
    • 25 Books From the 21st Century
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
  • Gifts
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Journals and Notebooks
    • socks
    • Games
  • Sell Books
  • Blog
  • Events
  • Find A Store

Don't Miss

  • Spring Sale
  • Scientifically Proven Sale
  • Powell's Author Events
  • Oregon Battle of the Books
  • Audio Books

Visit Our Stores


Kelsey Ford: 10 Books That Celebrate Women’s Rights and Women’s Wrongs (0 comment)
Sure, women’s rights have come a long way over the last century, but for every step forward, it feels like we take a few back, and when that feeling is so consistent, so insidious? Man, it makes me want to support women’s wrongs. On this list, you’ll find books about women’s rights — Gloria Steinem, Barbara Ehrenreich, Mary Beard...
Read More»
  • Rin S.: Five Book Friday: Autism and Neurodiversity Acceptance (0 comment)
  • Powell's Staff: Cooking Our Books: Booksellers Recommend 7 Delicious Cookbooks (1 comment)

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Network Security Essentials Applications and Standards

by Stallings, William
Network Security Essentials Applications and Standards

  • Comment on this title
  • Synopses & Reviews

ISBN13: 9780133370430
ISBN10: 0133370437



All Product Details

View Larger ImageView Larger Images
Ships free on qualified orders.
Add to Cart
0.00
List Price:0.00
Trade Paperback
Ships in 1 to 3 days
Add to Wishlist

Synopses & Reviews

Publisher Comments

Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist).

 

A practical survey of network security applications and standards, with unmatched support for instructors and students.

 

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards , Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. 

 

Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.


About the Author

Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia.

He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.


Table of Contents

Online Resources

Preface

About the Author

  Chapter 1       Introduction

         1.1         Computer Security Concepts

         1.2         The OSI Security Architecture

         1.3         Security Attacks

         1.4         Security Services

         1.5         Security Mechanisms

         1.6         A Model for Network Security

         1.7         Standards

         1.8         Outline of This Book

         1.9         Recommended Reading

         1.10         Internet and Web Resources

         1.11         Key Terms, Review Questions, and Problems PART ONE  CRYPTOGRAPHY

Chapter 2       Symmetric Encryption and Message Confidentiality

         2.1         Symmetric Encryption Principles

         2.2         Symmetric Block Encryption Algorithms

         2.3         Random and Pseudorandom Numbers

         2.4         Stream Ciphers and RC4

         2.5         Cipher Block Modes of Operation

         2.6         Recommended Reading

         2.7         Key Terms, Review Questions, and Problems Chapter 3       Public-Key Cryptography and Message Authentication

         3.1         Approaches to Message Authentication

         3.2         Secure Hash Functions

         3.3         Message Authentication Codes

         3.4         Public Key Cryptography Principles

         3.5         Public-Key Cryptography Algorithms

         3.6         Digital Signatures

         3.7         Recommended Reading

         3.8         Key Terms, Review Questions, and Problems PART TWO  NETWORK SECURITY APPLICATIONS

Chapter 4       Key Distribution and User Authentication

         4.1         Symmetric Key Distribution Using Symmetric Encryption

         4.2         Kerberos

         4.3         Key Distribution Using Asymmetric Encryption

         4.4         X.509 Certificates

         4.5         Public Key Infrastructure

         4.6         Federated Identity Management

         4.7         Recommended Reading

         4.8         Key Terms, Review Questions, and Problems Chapter 5       Network Access Control and Cloud Security

         5.1         Network Access Control

         5.2         Extensible Authentication Protocol

         5.3         IEEE 802.1X Port-Based Network Access Control

         5.4         Cloud Computing

         5.5         Cloud Security Risks and Countermeasures

         5.6         Data Protection in the Cloud

         5.7         Cloud Security as a Service

         5.8         Recommended Reading

         5.9         Key Terms, Review Questions, and Problems

Chapter 6       Transport-Level Security

         6.1         Web Security Issues

         6.2         Secure Sockets Layer (SSL)

         6.3         Transport Layer Security (TLS)

         6.4         HTTPS

         6.5         Secure Shell (SSH)

         6.6         Recommended Reading

         6.7         Key Terms, Review Questions, and Problems Chapter 7       Wireless Network Security

         7.1         Wireless Security

         7.2         Mobile Device Security

         7.3         IEEE 802.11 Wireless LAN Overview

         7.4         IEEE 802.11i Wireless LAN Security

         7.5         Recommended Reading

         7.6          Key Terms, Review Questions, and Problems

Chapter 8       Electronic Mail Security

         8.1         Pretty Good Privacy (PGP)

         8.2         S/MIME

         8.3         DomainKeys Identified Mail (DKIM)

         8.4         Recommended Web Sites

         8.5         Key Terms, Review Questions, and Problems Chapter 9       IP Security

         9.1         IP Security Overview

         9.2         IP Security Policy

         9.3         Encapsulating Security Payload

         9.4         Combining Security Associations

         9.5         Internet Key Exchange

         9.6         Cryptographic Suites

         9.7         Recommended Reading

         9.8          Key Terms, Review Questions, and Problems

PART THREE  SYSTEM SECURITY

Chapter 10       Malicious Software

         10.1         Types of Malicious Software

         10.2         Propagation – Infected Content - Viruses

         10.3         Propagation – Vulnerability Exploit - Worms

         10.4         Propagation – Social Engineering – SPAM, Trojans

         10.5         Payload – System Corruption

         10.6         Payload – Attack Agent – Zombie, Bots

         10.7         Payload – Information Theft – Keyloggers, Phishing, Spyware

         10.8         Payload – Stealthing – Backdoors, Rootkits

         10.9         Countermeasures

         10.10         Distributed Denial of Service Attacks

         10.11         Recommended Reading

         10.12         Key Terms, Review Questions, and Problems

Chapter 11       Intruders

         11.1         Intruders

         11.2         Intrusion Detection

         11.3         Password Management

         11.4         Recommended Reading

         11.5         Key Terms, Review Questions, and Problems Chapter 12       Firewalls

         12.1         The Need for Firewalls

         12.2         Firewall Characteristics

         12.3         Types of Firewalls

         12.4         Firewall Basing

         12.5         Firewall Location and Configurations

         12.6         Recommended Reading

         12.7         Key Terms, Review Questions, and Problems

APPENDICES

Appendix A              Some Aspects of Number Theory

         A.1         Prime and Relatively Prime Numbers

         A.2         Modular Arithmetic

Appendix B              Projects for Teaching Network Security

         B.1         Research Projects

         B.2         Hacking Project

         B.3         Programming Projects

         B.4         Laboratory Exercises

         B.5         Practical Security Assessments

         B.6         Writing Assignments

         B.7         Reading/Report Assignments REFERENCES

INDEX

ONLINE CHAPTERS AND APPENDICES - Online chapters, appendices, and other documents are Premium Content. Students must use the access card located in the front of the book to register and access the online premium content. If there is no access card, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.” Instructors must register on the site to access the material.

Chapter 13       Network Management Security

         13.1         Basic Concepts of SNMP

         13.2         SNMPv1 Community Facility

         13.3         SNMPv3

         13.4         Recommended Reading

         13.5         Key Terms, Review Questions, and Problems

  Chapter 14       Legal and Ethical Issues

         14.1         Cybercrime and Computer Crime

         14.2         Intellectual Property

         14.3         Privacy

         14.4         Ethical Issues

         14.5         Recommended Reading

         14.6         Key Terms, Review Questions, and Problems Chapter 15       SHA-3

         15.1         Evaluation Criteria for SHA-3

         15.2         The SHA-3 Algorithm

         15.3         Recommended Reading

         15.4         Key Terms and Review Questions Appendix C   Standards and Standards-Setting Organizations

         C.1         The Importance of Standards

         C.2         Internet Standards and the Internet Society

         C.3         National Institute of Standards and Technology Appendix D              TCP/IP and OSI

         D.1         Protocols and Protocol Architectures

         D.2         The TCP/IP Protocol Architecture

         D.3         The Role of an Internet Protocol

         D.4         IPv4

         D.5         IPv6

         D.6         The OSI Protocol Architecture Appendix E       Pseudorandom Number Generation

         E.1         PRNG Requirements

         E.2         PRNG Using a Block Cipher

         E.3         PRNG Using a Hash Function or Message Authentication Code Appendix F       Kerberos Encryption Techniques

         F.1         Password-to-Key  Transformation

         F.2         Propagating Cipher Block Chaining Mode Appendix G       Data Compression Using ZIP

         G.1         Compression Algorithm

         G.2         Decompression Algorithm Appendix H       More on PGP

         H.1         True Random Numbers

         H.2         Pseudorandom Numbers

         H.3         Cryptographic Keys and Key Rings

         H.4         Public-Key Management

Appendix I       The International Reference Alphabet

Appendix J       The Base-Rate Fallacy

Appendix K       Radix-64 Conversion

GLOSSARY

LIST OF ACRONYMS


What Our Readers Are Saying

Be the first to share your thoughts on this title!




Product Details

ISBN:
9780133370430
Binding:
Trade Paperback
Publication date:
03/16/2013
Publisher:
Pearson Education
Language:
English
Edition:
5
Pages:
427
Height:
.60IN
Width:
6.90IN
Thickness:
.75
LCCN:
2012047341
Illustration:
Yes
Author:
William Stallings
Media Run Time:
B

Ships free on qualified orders.
Add to Cart
0.00
List Price:0.00
Trade Paperback
Ships in 1 to 3 days
Add to Wishlist
Used Book Alert for book Receive an email when this ISBN is available used.
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Pinterest
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Transparency ACT MRF
  • Sitemap
  • © 2023 POWELLS.COM Terms

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##