Network security essentials : (Record no. 2200)

MARC details
000 -LEADER
fixed length control field 05870cam a22003375i 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-CaNGU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250513133745.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250513t2017 enka frb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781292154855
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1292154853
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
-- EG-CaNGU
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number STN
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William,
Relator term author.
9 (RLIN) 5844
245 10 - TITLE STATEMENT
Title Network security essentials :
Remainder of title applications and standards /
250 ## - EDITION STATEMENT
Edition statement Sixth edition.
250 ## - EDITION STATEMENT
Edition statement Global edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Harlow, England :
Name of producer, publisher, distributor, manufacturer Pearson Education Limited,
Date of production, publication, distribution, manufacture, or copyright notice [2017]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2017
300 ## - PHYSICAL DESCRIPTION
Extent 461 pages :
Other physical details illustrations ;
Dimensions 23 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Introduction -- Computer Security Concepts -- The OSI Security Architecture -- Security Attacks -- Security Services -- Security Mechanisms -- Fundamental Security Design Principles -- Attack Surfaces and Attack Trees -- A Model for Network Security -- Standards -- Key Terms, Review Questions, and Problems -- Part One: Cryptography -- Chapter 2: Symmetric Encryption and Message Confidentiality -- Symmetric Encryption Principles -- Symmetric Block Encryption Algorithms -- Random and Pseudorandom Numbers -- Stream Ciphers and RC4 -- Cipher Block Modes of Operation -- Key Terms, Review Questions, and Problems -- Chapter 3: Public-Key Cryptography and Message Authentication -- Approaches to Message Authentication -- Secure Hash Functions -- Message Authentication Codes -- Public-Key Cryptography Principles -- Public-Key Cryptography Algorithms -- Digital Signatures -- Key Terms, Review Questions, and Problems -- Part Two: Network Security Applications -- Chapter 4: Key Distribution and User Authentication -- Remote User Authentication Principles -- Symmetric Key Distribution Using Symmetric Encryption -- Kerberos -- Key Distribution Using Asymmetric Encryption -- X.509 Certificates -- Public-Key Infrastructure -- Federated Identity Management -- Key Terms, Review Questions, and Problems -- Chapter 5: Network Access Control and Cloud Security -- Network Access Control -- Extensible Authentication Protocol -- IEEE 802.1X Port-Based Network Access Control -- Cloud Computing -- Cloud Security Risks and Countermeasures -- Data Protection in the Cloud -- Cloud Security as a Service -- Addressing Cloud Computing Security Concerns -- Key Terms, Review Questions, and Problems -- Chapter 6: Transport-Level Security -- Web Security Considerations -- Transport Layer Security -- HTTPS -- Secure Shell (SSH) -- Key Terms, Review Questions, and Problems -- Chapter 7: Wireless Network Security -- Wireless Security -- Mobile Device Security -- IEEE 802.11 Wireless LAN Overview -- IEEE 802.11i Wireless LAN Security -- Key Terms, Review Questions, and Problems -- Chapter 8: Electronic Mail Security -- Internet Mail Architecture -- E-mail Formats -- E-mail Threats and Comprehensive E-mail Security -- S/MIME -- Pretty Good Privacy -- DNSSEC -- DNS-Based Authentication of Named Entities -- Sender Policy Framework -- DomainKeys Identified Mail -- Domain-Based Message Authentication, Reporting, and Conformance -- Key Terms, Review Questions, and Problems -- Chapter 9: IP Security -- IP Security Overview -- IP Security Policy -- Encapsulating Security Payload -- Combining Security Associations -- Internet Key Exchange -- Cryptographic Suites -- Key Terms, Review Questions, and Problems -- Part Three: System Security -- Chapter 10: Malicious Software -- Types of Malicious Software -- Advanced Persistent Threat -- Propagation—Infected Content—Viruses -- Propagation—Vulnerability Exploit—Worms -- Propagation—Social Engineering—Spam e-mail, Trojans -- Payload—System Corruption -- Payload—Attack Agent—Zombie, Bots -- Payload—Information Theft—Keyloggers, Phishing, Spyware -- Payload—Stealthing—Backdoors, Rootkits -- Countermeasures -- Distributed Denial of Service Attacks -- Key Terms, Review Questions, and Problems -- Chapter 11: Intruders -- Intruders -- Intrusion Detection -- Password Management -- Key Terms, Review Questions, and Problems -- Chapter 12: Firewalls -- The Need for Firewalls -- Firewall Characteristics and Access Policy -- Types of Firewalls -- Firewall Basing -- Firewall Location and Configurations -- Key Terms, Review Questions, and Problems -- Chapter 13: Network Management Security -- Basic Concepts of SNMP -- SNMPv1 Community Facility -- SNMPv3 -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part Five: Legal and Ethical Issues -- Chapter 14: Legal and Ethical Aspects -- Cybercrime and Computer Crime -- Intellectual Property -- Privacy -- Ethical Issues -- Recommended Reading -- References -- Key Terms, Review Questions, and Problems -- Information Privacy -- Chapter 15: SHA-3 -- Origins of SHA-3 -- Evaluation Criteria for SHA-3 -- The Sponge Construction -- The SHA-3 Iteration Function -- Recommended Reading and References -- Key Terms, Review Questions, and Problems -- Appendix A: Some Aspects of Number Theory -- Appendix B: Projects for Teaching Network Security -- Appendix C: Standards and Standard-Setting Organizations -- Appendix D: TCP/IP and OSI.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available on campus with authorized login.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision security measures.
Source of heading or term NGU-sh
9 (RLIN) 5839
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term NGU-sh
9 (RLIN) 5838
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
Source of heading or term NGU-sh
9 (RLIN) 5906
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name Online resource.
Uniform Resource Identifier <a href="https://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy">https://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy</a>
Public note Ask the librarian for access code.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Arrivals Code Full call number Barcode Date last seen Price effective from Koha item type Use restrictions Uniform Resource Identifier
    Dewey Decimal Classification   Not For Loan Engineering - CCAS Library D Library D 05/13/2025 Baccah 1500.00 ENGCCAS202506 005.8 STN 1004882 08/13/2025 05/13/2025 Book Non-borrowing    
    Dewey Decimal Classification     Engineering - CCAS Library D Library D 05/13/2025 Baccah 1500.00 ENGCCAS202506 005.8 STN 1004883 08/13/2025 05/13/2025 Book    
    Dewey Decimal Classification     Engineering - CCAS Online Online 05/13/2025       005.8 STN E1004882 05/13/2025 05/13/2025 eBook Unredeemed https://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy
    Dewey Decimal Classification     Engineering - CCAS Online Online 05/13/2025       005.8 STN E1004883 05/13/2025 05/13/2025 eBook Unredeemed https://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy