| 000 | 05870cam a22003375i 4500 | ||
|---|---|---|---|
| 003 | EG-CaNGU | ||
| 005 | 20250513133745.0 | ||
| 008 | 250513t2017 enka frb 001 0 eng d | ||
| 020 | _a9781292154855 | ||
| 020 | _a1292154853 | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC _dEG-CaNGU |
||
| 082 | 0 | 4 |
_a005.8 _bSTN _223 |
| 100 | 1 |
_aStallings, William, _eauthor. _95844 |
|
| 245 | 1 | 0 |
_aNetwork security essentials : _bapplications and standards / |
| 250 | _aSixth edition. | ||
| 250 | _aGlobal edition. | ||
| 264 | 1 |
_aHarlow, England : _bPearson Education Limited, _c[2017] |
|
| 264 | 4 | _c©2017 | |
| 300 |
_a461 pages : _billustrations ; _c23 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | 0 | _aChapter 1: Introduction -- Computer Security Concepts -- The OSI Security Architecture -- Security Attacks -- Security Services -- Security Mechanisms -- Fundamental Security Design Principles -- Attack Surfaces and Attack Trees -- A Model for Network Security -- Standards -- Key Terms, Review Questions, and Problems -- Part One: Cryptography -- Chapter 2: Symmetric Encryption and Message Confidentiality -- Symmetric Encryption Principles -- Symmetric Block Encryption Algorithms -- Random and Pseudorandom Numbers -- Stream Ciphers and RC4 -- Cipher Block Modes of Operation -- Key Terms, Review Questions, and Problems -- Chapter 3: Public-Key Cryptography and Message Authentication -- Approaches to Message Authentication -- Secure Hash Functions -- Message Authentication Codes -- Public-Key Cryptography Principles -- Public-Key Cryptography Algorithms -- Digital Signatures -- Key Terms, Review Questions, and Problems -- Part Two: Network Security Applications -- Chapter 4: Key Distribution and User Authentication -- Remote User Authentication Principles -- Symmetric Key Distribution Using Symmetric Encryption -- Kerberos -- Key Distribution Using Asymmetric Encryption -- X.509 Certificates -- Public-Key Infrastructure -- Federated Identity Management -- Key Terms, Review Questions, and Problems -- Chapter 5: Network Access Control and Cloud Security -- Network Access Control -- Extensible Authentication Protocol -- IEEE 802.1X Port-Based Network Access Control -- Cloud Computing -- Cloud Security Risks and Countermeasures -- Data Protection in the Cloud -- Cloud Security as a Service -- Addressing Cloud Computing Security Concerns -- Key Terms, Review Questions, and Problems -- Chapter 6: Transport-Level Security -- Web Security Considerations -- Transport Layer Security -- HTTPS -- Secure Shell (SSH) -- Key Terms, Review Questions, and Problems -- Chapter 7: Wireless Network Security -- Wireless Security -- Mobile Device Security -- IEEE 802.11 Wireless LAN Overview -- IEEE 802.11i Wireless LAN Security -- Key Terms, Review Questions, and Problems -- Chapter 8: Electronic Mail Security -- Internet Mail Architecture -- E-mail Formats -- E-mail Threats and Comprehensive E-mail Security -- S/MIME -- Pretty Good Privacy -- DNSSEC -- DNS-Based Authentication of Named Entities -- Sender Policy Framework -- DomainKeys Identified Mail -- Domain-Based Message Authentication, Reporting, and Conformance -- Key Terms, Review Questions, and Problems -- Chapter 9: IP Security -- IP Security Overview -- IP Security Policy -- Encapsulating Security Payload -- Combining Security Associations -- Internet Key Exchange -- Cryptographic Suites -- Key Terms, Review Questions, and Problems -- Part Three: System Security -- Chapter 10: Malicious Software -- Types of Malicious Software -- Advanced Persistent Threat -- Propagation—Infected Content—Viruses -- Propagation—Vulnerability Exploit—Worms -- Propagation—Social Engineering—Spam e-mail, Trojans -- Payload—System Corruption -- Payload—Attack Agent—Zombie, Bots -- Payload—Information Theft—Keyloggers, Phishing, Spyware -- Payload—Stealthing—Backdoors, Rootkits -- Countermeasures -- Distributed Denial of Service Attacks -- Key Terms, Review Questions, and Problems -- Chapter 11: Intruders -- Intruders -- Intrusion Detection -- Password Management -- Key Terms, Review Questions, and Problems -- Chapter 12: Firewalls -- The Need for Firewalls -- Firewall Characteristics and Access Policy -- Types of Firewalls -- Firewall Basing -- Firewall Location and Configurations -- Key Terms, Review Questions, and Problems -- Chapter 13: Network Management Security -- Basic Concepts of SNMP -- SNMPv1 Community Facility -- SNMPv3 -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part Five: Legal and Ethical Issues -- Chapter 14: Legal and Ethical Aspects -- Cybercrime and Computer Crime -- Intellectual Property -- Privacy -- Ethical Issues -- Recommended Reading -- References -- Key Terms, Review Questions, and Problems -- Information Privacy -- Chapter 15: SHA-3 -- Origins of SHA-3 -- Evaluation Criteria for SHA-3 -- The Sponge Construction -- The SHA-3 Iteration Function -- Recommended Reading and References -- Key Terms, Review Questions, and Problems -- Appendix A: Some Aspects of Number Theory -- Appendix B: Projects for Teaching Network Security -- Appendix C: Standards and Standard-Setting Organizations -- Appendix D: TCP/IP and OSI. |
| 506 | _aAvailable on campus with authorized login. | ||
| 650 | 7 |
_aComputer networks _xsecurity measures. _2NGU-sh _95839 |
|
| 650 | 7 |
_aComputer security. _2NGU-sh _95838 |
|
| 650 | 7 |
_aData encryption (Computer science). _2NGU-sh _95906 |
|
| 856 | 4 | 0 |
_aOnline resource. _uhttps://login.pearson.com/v1/piapi/iesui/signin?auto_login=false&siteid=8313&okurl=https%3A%2F%2Fmycourses.pearson.com%2Fcourse-home&client_id=dN4bOBG0sGO9c9HADrifwQeqma5vjREy _zAsk the librarian for access code. |
| 999 |
_c2200 _d2200 |
||