Network security essentials : applications and standards /

Stallings, William,

Network security essentials : applications and standards / - Sixth edition. Global edition. - 461 pages : illustrations ; 23 cm

Includes bibliographical references and index.

Chapter 1: Introduction -- Computer Security Concepts -- The OSI Security Architecture -- Security Attacks -- Security Services -- Security Mechanisms -- Fundamental Security Design Principles -- Attack Surfaces and Attack Trees -- A Model for Network Security -- Standards -- Key Terms, Review Questions, and Problems -- Part One: Cryptography -- Chapter 2: Symmetric Encryption and Message Confidentiality -- Symmetric Encryption Principles -- Symmetric Block Encryption Algorithms -- Random and Pseudorandom Numbers -- Stream Ciphers and RC4 -- Cipher Block Modes of Operation -- Key Terms, Review Questions, and Problems -- Chapter 3: Public-Key Cryptography and Message Authentication -- Approaches to Message Authentication -- Secure Hash Functions -- Message Authentication Codes -- Public-Key Cryptography Principles -- Public-Key Cryptography Algorithms -- Digital Signatures -- Key Terms, Review Questions, and Problems -- Part Two: Network Security Applications -- Chapter 4: Key Distribution and User Authentication -- Remote User Authentication Principles -- Symmetric Key Distribution Using Symmetric Encryption -- Kerberos -- Key Distribution Using Asymmetric Encryption -- X.509 Certificates -- Public-Key Infrastructure -- Federated Identity Management -- Key Terms, Review Questions, and Problems -- Chapter 5: Network Access Control and Cloud Security -- Network Access Control -- Extensible Authentication Protocol -- IEEE 802.1X Port-Based Network Access Control -- Cloud Computing -- Cloud Security Risks and Countermeasures -- Data Protection in the Cloud -- Cloud Security as a Service -- Addressing Cloud Computing Security Concerns -- Key Terms, Review Questions, and Problems -- Chapter 6: Transport-Level Security -- Web Security Considerations -- Transport Layer Security -- HTTPS -- Secure Shell (SSH) -- Key Terms, Review Questions, and Problems -- Chapter 7: Wireless Network Security -- Wireless Security -- Mobile Device Security -- IEEE 802.11 Wireless LAN Overview -- IEEE 802.11i Wireless LAN Security -- Key Terms, Review Questions, and Problems -- Chapter 8: Electronic Mail Security -- Internet Mail Architecture -- E-mail Formats -- E-mail Threats and Comprehensive E-mail Security -- S/MIME -- Pretty Good Privacy -- DNSSEC -- DNS-Based Authentication of Named Entities -- Sender Policy Framework -- DomainKeys Identified Mail -- Domain-Based Message Authentication, Reporting, and Conformance -- Key Terms, Review Questions, and Problems -- Chapter 9: IP Security -- IP Security Overview -- IP Security Policy -- Encapsulating Security Payload -- Combining Security Associations -- Internet Key Exchange -- Cryptographic Suites -- Key Terms, Review Questions, and Problems -- Part Three: System Security -- Chapter 10: Malicious Software -- Types of Malicious Software -- Advanced Persistent Threat -- Propagation—Infected Content—Viruses -- Propagation—Vulnerability Exploit—Worms -- Propagation—Social Engineering—Spam e-mail, Trojans -- Payload—System Corruption -- Payload—Attack Agent—Zombie, Bots -- Payload—Information Theft—Keyloggers, Phishing, Spyware -- Payload—Stealthing—Backdoors, Rootkits -- Countermeasures -- Distributed Denial of Service Attacks -- Key Terms, Review Questions, and Problems -- Chapter 11: Intruders -- Intruders -- Intrusion Detection -- Password Management -- Key Terms, Review Questions, and Problems -- Chapter 12: Firewalls -- The Need for Firewalls -- Firewall Characteristics and Access Policy -- Types of Firewalls -- Firewall Basing -- Firewall Location and Configurations -- Key Terms, Review Questions, and Problems -- Chapter 13: Network Management Security -- Basic Concepts of SNMP -- SNMPv1 Community Facility -- SNMPv3 -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part Five: Legal and Ethical Issues -- Chapter 14: Legal and Ethical Aspects -- Cybercrime and Computer Crime -- Intellectual Property -- Privacy -- Ethical Issues -- Recommended Reading -- References -- Key Terms, Review Questions, and Problems -- Information Privacy -- Chapter 15: SHA-3 -- Origins of SHA-3 -- Evaluation Criteria for SHA-3 -- The Sponge Construction -- The SHA-3 Iteration Function -- Recommended Reading and References -- Key Terms, Review Questions, and Problems -- Appendix A: Some Aspects of Number Theory -- Appendix B: Projects for Teaching Network Security -- Appendix C: Standards and Standard-Setting Organizations -- Appendix D: TCP/IP and OSI.

Available on campus with authorized login.

9781292154855 1292154853


Computer networks--security measures.
Computer security.
Data encryption (Computer science).

005.8 / STN