Network Security Essentials Applications and Standards 4th edition by William Stalling – Ebook PDF Instant Download/Delivery:0136108059 978-0136108054
Full download Network Security Essentials Applications and Standards 4th edition after payment
Product details:
ISBN 10: 0136108059
ISBN 13: 978-0136108054
Author: William Stalling
Wiliiam Stallings’ Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students.
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.
Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.
Network Security Essentials Applications and Standards 4th Table of contents:
Chapter 1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Standards
1.8 Outline of This Book
1.9 Recommended Reading
1.10 Internet and Web Resources
1.11 Key Terms, Review Questions, and Problems
PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
2.6 Recommended Reading and Web Sites
2.7 Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Public-Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures
3.7 Recommended Reading and Web Sites
3.8 Key Terms, Review Questions, and Problems
PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Key Distribution and User Authentication
4.1 Symmetric Key Distribution Using Symmetric Encryption
4.2 Kerberos
4.3 Key Distribution Using Asymmetric Encryption
4.4 X.509 Certificates
4.5 Public-Key Infrastructure
vi CONTENTS
4.6 Federated Identity Management
4.7 Recommended Reading and Web Sites
4.8 Key Terms, Review Questions, and Problems
Chapter 5 Transport-Level Security
5.1 Web Security Considerations
5.2 Secure Socket Layer and Transport Layer Security
5.3 Transport Layer Security
5.4 HTTPS
5.5 Secure Shell (SSH)
5.6 Recommended Reading and Web Sites
5.7 Key Terms, Review Questions, and Problems
Chapter 6 Wireless Network Security
6.1 IEEE 802.11 Wireless LAN Overview
6.2 IEEE 802.11i Wireless LAN Security
6.3 Wireless Application Protocol Overview
6.4 Wireless Transport Layer Security
6.5 WAP End-to-End Security
6.6 Recommended Reading and Web Sites
6.7 Key Terms, Review Questions, and Problems
Chapter 7 Electronic Mail Security
7.1 Pretty Good Privacy
7.2 S/MIME
7.3 DomainKeys Identified Mail
7.4 Recommended Reading and Web Sites
7.5 Key Terms, Review Questions, and Problems
Appendix 7A Radix-64 Conversion
Chapter 8 IP Security
8.1 IP Security Overview
8.2 IP Security Policy
8.3 Encapsulating Security Payload
8.4 Combining Security Associations
8.5 Internet Key Exchange
8.6 Cryptographic Suites
8.7 Recommended Reading and Web Sites
8.8 Key Terms, Review Questions, and Prob
People also search for Network Security Essentials Applications and Standards 4th :
stallings w 2017 network security essentials applications and standards pearson
borrow network security essentials applications and standards
stallings w network security essentials applications and standards
network security essentials applications and standards 5th edition
stallings w 2017 network security essentials applications and standards
Tags:
William Stalling,Network Security,Essentials Applications
Reviews
There are no reviews yet.