Amazon cover image
Image from Amazon.com
Image from Coce

Network security essentials : applications and standards /

By: Material type: TextPublisher: Harlow, England : Pearson Education Limited, [2017]Copyright date: ©2017Edition: Sixth edition; Global editionDescription: 461 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781292154855
  • 1292154853
Subject(s): DDC classification:
  • 005.8 STN 23
Online resources:
Contents:
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Book Non-borrowing Library D Engineering - CCAS 005.8 STN (Browse shelf(Opens below)) Not For Loan 1004882
Book Library D Engineering - CCAS 005.8 STN (Browse shelf(Opens below)) Available 1004883
eBook Online Engineering - CCAS 005.8 STN (Browse shelf(Opens below)) Link to resource Available (Unredeemed) E1004882
eBook Online Engineering - CCAS 005.8 STN (Browse shelf(Opens below)) Link to resource Available (Unredeemed) E1004883
Total holds: 0

Includes bibliographical references and index.

Chapter 1: Introduction -- Computer Security Concepts -- The OSI Security Architecture -- Security Attacks -- Security Services -- Security Mechanisms -- Fundamental Security Design Principles -- Attack Surfaces and Attack Trees -- A Model for Network Security -- Standards -- Key Terms, Review Questions, and Problems -- Part One: Cryptography -- Chapter 2: Symmetric Encryption and Message Confidentiality -- Symmetric Encryption Principles -- Symmetric Block Encryption Algorithms -- Random and Pseudorandom Numbers -- Stream Ciphers and RC4 -- Cipher Block Modes of Operation -- Key Terms, Review Questions, and Problems -- Chapter 3: Public-Key Cryptography and Message Authentication -- Approaches to Message Authentication -- Secure Hash Functions -- Message Authentication Codes -- Public-Key Cryptography Principles -- Public-Key Cryptography Algorithms -- Digital Signatures -- Key Terms, Review Questions, and Problems -- Part Two: Network Security Applications -- Chapter 4: Key Distribution and User Authentication -- Remote User Authentication Principles -- Symmetric Key Distribution Using Symmetric Encryption -- Kerberos -- Key Distribution Using Asymmetric Encryption -- X.509 Certificates -- Public-Key Infrastructure -- Federated Identity Management -- Key Terms, Review Questions, and Problems -- Chapter 5: Network Access Control and Cloud Security -- Network Access Control -- Extensible Authentication Protocol -- IEEE 802.1X Port-Based Network Access Control -- Cloud Computing -- Cloud Security Risks and Countermeasures -- Data Protection in the Cloud -- Cloud Security as a Service -- Addressing Cloud Computing Security Concerns -- Key Terms, Review Questions, and Problems -- Chapter 6: Transport-Level Security -- Web Security Considerations -- Transport Layer Security -- HTTPS -- Secure Shell (SSH) -- Key Terms, Review Questions, and Problems -- Chapter 7: Wireless Network Security -- Wireless Security -- Mobile Device Security -- IEEE 802.11 Wireless LAN Overview -- IEEE 802.11i Wireless LAN Security -- Key Terms, Review Questions, and Problems -- Chapter 8: Electronic Mail Security -- Internet Mail Architecture -- E-mail Formats -- E-mail Threats and Comprehensive E-mail Security -- S/MIME -- Pretty Good Privacy -- DNSSEC -- DNS-Based Authentication of Named Entities -- Sender Policy Framework -- DomainKeys Identified Mail -- Domain-Based Message Authentication, Reporting, and Conformance -- Key Terms, Review Questions, and Problems -- Chapter 9: IP Security -- IP Security Overview -- IP Security Policy -- Encapsulating Security Payload -- Combining Security Associations -- Internet Key Exchange -- Cryptographic Suites -- Key Terms, Review Questions, and Problems -- Part Three: System Security -- Chapter 10: Malicious Software -- Types of Malicious Software -- Advanced Persistent Threat -- Propagation—Infected Content—Viruses -- Propagation—Vulnerability Exploit—Worms -- Propagation—Social Engineering—Spam e-mail, Trojans -- Payload—System Corruption -- Payload—Attack Agent—Zombie, Bots -- Payload—Information Theft—Keyloggers, Phishing, Spyware -- Payload—Stealthing—Backdoors, Rootkits -- Countermeasures -- Distributed Denial of Service Attacks -- Key Terms, Review Questions, and Problems -- Chapter 11: Intruders -- Intruders -- Intrusion Detection -- Password Management -- Key Terms, Review Questions, and Problems -- Chapter 12: Firewalls -- The Need for Firewalls -- Firewall Characteristics and Access Policy -- Types of Firewalls -- Firewall Basing -- Firewall Location and Configurations -- Key Terms, Review Questions, and Problems -- Chapter 13: Network Management Security -- Basic Concepts of SNMP -- SNMPv1 Community Facility -- SNMPv3 -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part Five: Legal and Ethical Issues -- Chapter 14: Legal and Ethical Aspects -- Cybercrime and Computer Crime -- Intellectual Property -- Privacy -- Ethical Issues -- Recommended Reading -- References -- Key Terms, Review Questions, and Problems -- Information Privacy -- Chapter 15: SHA-3 -- Origins of SHA-3 -- Evaluation Criteria for SHA-3 -- The Sponge Construction -- The SHA-3 Iteration Function -- Recommended Reading and References -- Key Terms, Review Questions, and Problems -- Appendix A: Some Aspects of Number Theory -- Appendix B: Projects for Teaching Network Security -- Appendix C: Standards and Standard-Setting Organizations -- Appendix D: TCP/IP and OSI.

Available on campus with authorized login.

There are no comments on this title.

to post a comment.
Share