Network Security Essentials: Applications and Standards, Global Edition
Lýsing:
For courses in Corporate, Computer and Network Security. Network Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organisations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.
The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving students a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards. The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.
Annað
- Höfundur: William Stallings
- Útgáfa:6
- Útgáfudagur: 2018-10-18
- Hægt að prenta út 2 bls.
- Hægt að afrita 2 bls.
- Format:Page Fidelity
- ISBN 13: 9781292154916
- Print ISBN: 9781292154855
- ISBN 10: 1292154918
Efnisyfirlit
- Contents
- Preface
- About the Author
- Chapter 1 Introduction
- 1.1 Computer Security Concepts
- 1.2 The OSI Security Architecture
- 1.3 Security Attacks
- 1.4 Security Services
- 1.5 Security Mechanisms
- 1.6 Fundamental Security Design Principles
- 1.7 Attack Surfaces and Attack Trees
- 1.8 A Model for Network Security
- 1.9 Standards
- 1.10 Key Terms, Review Questions, and Problems
- PART ONE: CRYPTOGRAPHY
- Chapter 2 Symmetric Encryption and Message Confidentiality
- 2.1 Symmetric Encryption Principles
- 2.2 Symmetric Block Encryption Algorithms
- 2.3 Random and Pseudorandom Numbers
- 2.4 Stream Ciphers and RC4
- 2.5 Cipher Block Modes of Operation
- 2.6 Key Terms, Review Questions, and Problems
- Chapter 3 Public-Key Cryptography and Message Authentication
- 3.1 Approaches to Message Authentication
- 3.2 Secure Hash Functions
- 3.3 Message Authentication Codes
- 3.4 Public-Key Cryptography Principles
- 3.5 Public-Key Cryptography Algorithms
- 3.6 Digital Signatures
- 3.7 Key Terms, Review Questions, and Problems
- Chapter 2 Symmetric Encryption and Message Confidentiality
- Chapter 4 Key Distribution and User Authentication
- 4.1 Remote User Authentication Principles
- 4.2 Symmetric Key Distribution Using Symmetric Encryption
- 4.3 Kerberos
- 4.4 Key Distribution Using Asymmetric Encryption
- 4.5 X.509 Certificates
- 4.6 Public-Key Infrastructure
- 4.7 Federated Identity Management
- 4.8 Key Terms, Review Questions, and Problems
- Chapter 5 Network Access Control and Cloud Security
- 5.1 Network Access Control
- 5.2 Extensible Authentication Protocol
- 5.3 IEEE 802.1X Port-Based Network Access Control
- 5.4 Cloud Computing
- 5.5 Cloud Security Risks and Countermeasures
- 5.6 Data Protection in the Cloud
- 5.7 Cloud Security as a Service
- 5.8 Addressing Cloud Computing Security Concerns
- 5.9 Key Terms, Review Questions, and Problems
- Chapter 6 Transport-Level Security
- 6.1 Web Security Considerations
- 6.2 Transport Layer Security
- 6.3 HTTPS
- 6.4 Secure Shell (SSH)
- 6.5 Key Terms, Review Questions, and Problems
- Chapter 7 Wireless Network Security
- 7.1 Wireless Security
- 7.2 Mobile Device Security
- 7.3 IEEE 802.11 Wireless LAN Overview
- 7.4 IEEE 802.11i Wireless LAN Security
- 7.5 Key Terms, Review Questions, and Problems
- Chapter 8 Electronic Mail Security
- 8.1 Internet Mail Architecture
- 8.2 E-mail Formats
- 8.3 E-mail Threats and Comprehensive E-mail Security
- 8.4 S/MIME
- 8.5 Pretty Good Privacy
- 8.6 DNSSEC
- 8.7 DNS-Based Authentication of Named Entities
- 8.8 Sender Policy Framework
- 8.9 DomainKeys Identified Mail
- 8.10 Domain-Based Message Authentication, Reporting, and Conformance
- 8.11 Key Terms, Review Questions, and Problems
- Chapter 9 IP Security
- 9.1 IP Security Overview
- 9.2 IP Security Policy
- 9.3 Encapsulating Security Payload
- 9.4 Combining Security Associations
- 9.5 Internet Key Exchange
- 9.6 Cryptographic Suites
- 9.7 Key Terms, Review Questions, and Problems
- Chapter 10 Malicious Software
- 10.1 Types of Malicious Software (Malware)
- 10.2 Advanced Persistent Threat
- 10.3 Propagation—Infected Content—Viruses
- 10.4 Propagation—Vulnerability Exploit—Worms
- 10.5 Propagation—Social Engineering—Spam E-mail, Trojans
- 10.6 Payload—System Corruption
- 10.7 Payload—Attack Agent—Zombie, Bots
- 10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware
- 10.9 Payload—Stealthing—Backdoors, Rootkits
- 10.10 Countermeasures
- 10.11 Distributed Denial of Service Attacks
- 10.12 Key Terms, Review Questions, and Problems
- Chapter 11 Intruders
- 11.1 Intruders
- 11.2 Intrusion Detection
- 11.3 Password Management
- 11.4 Key Terms, Review Questions, and Problems
- Chapter 12 Firewalls
- 12.1 The Need for Firewalls
- 12.2 Firewall Characteristics and Access Policy
- 12.3 Types of Firewalls
- 12.4 Firewall Basing
- 12.5 Firewall Location and Configurations
- 12.6 Key Terms, Review Questions, and Problems
- Appendix A Some Aspects of Number Theory
- A.1 Prime and Relatively Prime Numbers
- A.2 Modular Arithmetic
- Appendix B Projects for Teaching Network Security
- B.1 Research Projects
- B.2 Hacking Project
- B.3 Programming Projects
- B.4 Laboratory Exercises
- B.5 Practical Security Assessments
- B.6 Firewall Projects
- B.7 Case Studies
- B.8 Writing Assignments
- B.9 Reading/Report Assignments
- A
- B
- C
- D
- E
- F
- G
- H
- I
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- X
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 6170
- Útgáfuár : 2017
- Leyfi : 380