MARC details
| 000 -LEADER |
| fixed length control field |
05870cam a22003375i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
EG-CaNGU |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250513133745.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
250513t2017 enka frb 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781292154855 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1292154853 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Transcribing agency |
DLC |
| Description conventions |
rda |
| Modifying agency |
DLC |
| -- |
EG-CaNGU |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Item number |
STN |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Stallings, William, |
| Relator term |
author. |
| 9 (RLIN) |
5844 |
| 245 10 - TITLE STATEMENT |
| Title |
Network security essentials : |
| Remainder of title |
applications and standards / |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Sixth edition. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Global edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Harlow, England : |
| Name of producer, publisher, distributor, manufacturer |
Pearson Education Limited, |
| Date of production, publication, distribution, manufacture, or copyright notice |
[2017] |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2017 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
461 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
23 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 00 - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1: Introduction -- Computer Security Concepts -- The OSI Security Architecture -- Security Attacks -- Security Services -- Security Mechanisms -- Fundamental Security Design Principles -- Attack Surfaces and Attack Trees -- A Model for Network Security -- Standards -- Key Terms, Review Questions, and Problems -- Part One: Cryptography -- Chapter 2: Symmetric Encryption and Message Confidentiality -- Symmetric Encryption Principles -- Symmetric Block Encryption Algorithms -- Random and Pseudorandom Numbers -- Stream Ciphers and RC4 -- Cipher Block Modes of Operation -- Key Terms, Review Questions, and Problems -- Chapter 3: Public-Key Cryptography and Message Authentication -- Approaches to Message Authentication -- Secure Hash Functions -- Message Authentication Codes -- Public-Key Cryptography Principles -- Public-Key Cryptography Algorithms -- Digital Signatures -- Key Terms, Review Questions, and Problems -- Part Two: Network Security Applications -- Chapter 4: Key Distribution and User Authentication -- Remote User Authentication Principles -- Symmetric Key Distribution Using Symmetric Encryption -- Kerberos -- Key Distribution Using Asymmetric Encryption -- X.509 Certificates -- Public-Key Infrastructure -- Federated Identity Management -- Key Terms, Review Questions, and Problems -- Chapter 5: Network Access Control and Cloud Security -- Network Access Control -- Extensible Authentication Protocol -- IEEE 802.1X Port-Based Network Access Control -- Cloud Computing -- Cloud Security Risks and Countermeasures -- Data Protection in the Cloud -- Cloud Security as a Service -- Addressing Cloud Computing Security Concerns -- Key Terms, Review Questions, and Problems -- Chapter 6: Transport-Level Security -- Web Security Considerations -- Transport Layer Security -- HTTPS -- Secure Shell (SSH) -- Key Terms, Review Questions, and Problems -- Chapter 7: Wireless Network Security -- Wireless Security -- Mobile Device Security -- IEEE 802.11 Wireless LAN Overview -- IEEE 802.11i Wireless LAN Security -- Key Terms, Review Questions, and Problems -- Chapter 8: Electronic Mail Security -- Internet Mail Architecture -- E-mail Formats -- E-mail Threats and Comprehensive E-mail Security -- S/MIME -- Pretty Good Privacy -- DNSSEC -- DNS-Based Authentication of Named Entities -- Sender Policy Framework -- DomainKeys Identified Mail -- Domain-Based Message Authentication, Reporting, and Conformance -- Key Terms, Review Questions, and Problems -- Chapter 9: IP Security -- IP Security Overview -- IP Security Policy -- Encapsulating Security Payload -- Combining Security Associations -- Internet Key Exchange -- Cryptographic Suites -- Key Terms, Review Questions, and Problems -- Part Three: System Security -- Chapter 10: Malicious Software -- Types of Malicious Software -- Advanced Persistent Threat -- Propagation—Infected Content—Viruses -- Propagation—Vulnerability Exploit—Worms -- Propagation—Social Engineering—Spam e-mail, Trojans -- Payload—System Corruption -- Payload—Attack Agent—Zombie, Bots -- Payload—Information Theft—Keyloggers, Phishing, Spyware -- Payload—Stealthing—Backdoors, Rootkits -- Countermeasures -- Distributed Denial of Service Attacks -- Key Terms, Review Questions, and Problems -- Chapter 11: Intruders -- Intruders -- Intrusion Detection -- Password Management -- Key Terms, Review Questions, and Problems -- Chapter 12: Firewalls -- The Need for Firewalls -- Firewall Characteristics and Access Policy -- Types of Firewalls -- Firewall Basing -- Firewall Location and Configurations -- Key Terms, Review Questions, and Problems -- Chapter 13: Network Management Security -- Basic Concepts of SNMP -- SNMPv1 Community Facility -- SNMPv3 -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part Five: Legal and Ethical Issues -- Chapter 14: Legal and Ethical Aspects -- Cybercrime and Computer Crime -- Intellectual Property -- Privacy -- Ethical Issues -- Recommended Reading -- References -- Key Terms, Review Questions, and Problems -- Information Privacy -- Chapter 15: SHA-3 -- Origins of SHA-3 -- Evaluation Criteria for SHA-3 -- The Sponge Construction -- The SHA-3 Iteration Function -- Recommended Reading and References -- Key Terms, Review Questions, and Problems -- Appendix A: Some Aspects of Number Theory -- Appendix B: Projects for Teaching Network Security -- Appendix C: Standards and Standard-Setting Organizations -- Appendix D: TCP/IP and OSI. |
| 506 ## - RESTRICTIONS ON ACCESS NOTE |
| Terms governing access |
Available on campus with authorized login. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
security measures. |
| Source of heading or term |
NGU-sh |
| 9 (RLIN) |
5839 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| Source of heading or term |
NGU-sh |
| 9 (RLIN) |
5838 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data encryption (Computer science). |
| Source of heading or term |
NGU-sh |
| 9 (RLIN) |
5906 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Host name |
Online resource. |
| Uniform Resource Identifier |
<a href="https://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy">https://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy</a> |
| Public note |
Ask the librarian for access code. |