Network Security Essentials:Applications and Standards: International Edition

Network Security Essentials:Applications and Standards: International Edition


Yazar William Stallings
Yayınevi Pearson Education
ISBN 9780137067923
Baskı yılı 2010
Sayfa sayısı 432
Ağırlık 0.57 kg
Edisyon 4
Stok durumu Var    Stok detayları
Kargoya teslim Aynı gün kargo

Wiliiam Stallings Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition. Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.
About the Author Preface Chapter 1 Introduction 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Standards 1.8 Outline of This Book 1.9 Recommended Reading 1.10 Internet and Web Resources 1.11 Key Terms, Review Questions, and Problems PART ONE CRYPTOGRAPHY Chapter 2 Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles 2.2 Symmetric Block Encryption Algorithms 2.3 Random and Pseudorandom Numbers 2.4 Stream Ciphers and RC4 2.5 Cipher Block Modes of Operation 2.6 Recommended Reading and Web Sites 2.7 Key Terms, Review Questions, and Problems Chapter 3 Public-Key Cryptography and Message Authentication 3.1 Approaches to Message Authentication 3.2 Secure Hash Functions 3.3 Message Authentication Codes 3.4 Public Key Cryptography Principles 3.5 Public-Key Cryptography Algorithms 3.6 Digital Signatures 3.7 Recommended Reading and Web Sites 3.8 Key Terms, Review Questions, and Problems PART TWO NETWORK SECURITY APPLICATIONS Chapter 4 Key Distribution and User Authentication 4.1 Symmetric Key Distribution Using Symmetric Encryption 4.2 Kerberos 4.3 Key Distribution Using Asymmetric Encryption 4.4 X.509 Certificates 4.5 Public Key Infrastructure 4.6 Federated Identity Management 4.7 Recommended Reading and Web Sites 4.8 Key Terms, Review Questions, and Problems Chapter 5 Transport-Level Security 5.1 Web Security Issues 5.2 Secure Sockets Layer (SSL) 5.3 Transport Layer Security (TLS) 5.4 HTTPS 5.5 Secure Shell (SSH) 5.6 Recommended Reading and Web Sites 5.7 Key Terms, Review Questions, and Problems Chapter 6 Wireless Network Security 6.1 IEEE 802.11 Wireless LAN Overview 6.2 IEEE 802.11i Wireless LAN Security 6.3 Wireless Application Protocol Overview 6.4 Wireless Transport Layer Security 6.5 WAP End-to-End Security 6.6 Recommended Reading and Web Sites 6.7 Key Terms, Review Questions, and Problems Chapter 7 Electronic Mail Security 7.1 Pretty Good Privacy (PGP) 7.2 S/MIME 7.3 DomainKeys Identified Mail (DKIM) 7.4 Recommended Web Sites 7.5 Key Terms, Review Questions, and Problems Appendix 7A: Radix-64 Conversion Chapter 8 IP Security 8.1 IP Security Overview 8.2 IP Security Policy 8.3 Encapsulating Security Payload 8.4 Combining Security Associations 8.5 Internet Key Exchange 8.6 Cryptographic Suites 8.7 Recommended Reading and Web Sites 8.8 Key Terms, Review Questions, and Problems PART THREE SYSTEM SECURITY Chapter 9 Intruders 9.1 Intruders 9.2 Intrusion Detection 9.3 Password Management 9.4 Recommended Reading and Web Sites 9.5 Key Terms, Review Questions, and Problems Appendix 9A The Base-Rate Fallacy Chapter 10 Malicious Software 10.1 Types of Malicious Software 10.2 Viruses 10.3 Virus Countermeasures 10.4 Worms 10.5 Distributed Denial of Service Attacks 10.6 Recommended Reading and Web Sites 10.7 Key Terms, Review Questions, and Problems Chapter 11 Firewalls 11.1 The Need for Firewalls 11.2 Firewall Characteristics 11.3 Types of Firewalls 11.4 Firewall Basing 11.5 Firewall Location and Configurations 11.6 Recommended Reading and Web Sites 11.7 Key Terms, Review Questions, and Problems APPENDICES Appendix A Some Aspects of Number Theory A.1 Prime and Relatively Prime Numbers A.2 Modular Arithmetic Appendix B Projects for Teaching Network Security B.1 Research Projects B.2 Hacking Project B.3 Programming Projects B.4 Laboratory Exercises B.5 Practical Security Assessments B.6 Writing Assignments B.7 Reading/Report Assignments ONLINE CHAPTERS Chapter 12 Network Management Security 12.1 Basic Concepts of SNMP 12.2 SNMPv1 Community Facility 12.3 SNMPv3 12.4 Recommended Reading and Web Sites 12.5 Key Terms, Review Questions, and Problems Chapter 13 Legal and Ethical Issues 13.1 Cybercrime and Computer Crime 13.2 Intellectual Property 13.3 Privacy 13.4 Ethical Issues 13.5 Recommended Reading and Web Sites 13.6 Key Terms, Review Questions, and Problems ONLINE APPENDICES Appendix C Standards and Standards-Setting Organizations C.1 The Importance of Standards C.2 Internet Standards and the Internet Society C.3 National Institute of Standards and Technology Appendix D TCP/IP and OSI D.1 Protocols and Protocol Architectures D.2 The TCP/IP Protocol Architecture D.3 The Role of an Internet Protocol D.4 IPv4 D.5 IPv6 D.6 The OSI Protocol Architecture Appendix E Pseudorandom Number Generation E.1 PRNG Requirements E.2 PRNG Using a Block Cipher E.3 PRNG Using a Hash Function or Message Authentication Code Appendix F Kerberos Encryption Techniques F.1 Password-to-Key Transformation F.2 Propagating Cipher Block Chaining Mode Appendix G Data Compression Using ZIP Appendix H PGP Random Number Generation GLOSSARY REFERENCES INDEX LIST OF ACRONYMS

Axess
Axess

Taksit Taksit Tutarı Toplam Tutar
Tek çekim - 138.50 TL
2 ay 71.67 TL 143.35 TL
3 ay 48.71 TL 146.12 TL
6 ay 25.97 TL 155.81 TL
9 ay 18.47 TL 166.20 TL
12 ay 14.95 TL 179.36 TL

cardFinans
cardFinans

Taksit Taksit Tutarı Toplam Tutar
Tek çekim - 138.50 TL
2 ay 71.67 TL 143.35 TL
3 ay 48.71 TL 146.12 TL
6 ay 25.97 TL 155.81 TL
9 ay 18.47 TL 166.20 TL
12 ay 14.95 TL 179.36 TL

Bonus
Bonus

Taksit Taksit Tutarı Toplam Tutar
Tek çekim - 138.50 TL
2 ay 71.67 TL 143.35 TL
3 ay 48.71 TL 146.12 TL
6 ay 25.97 TL 155.81 TL
9 ay 18.47 TL 166.20 TL
12 ay 14.95 TL 179.36 TL

World
World

Taksit Taksit Tutarı Toplam Tutar
Tek çekim - 138.50 TL
2 ay 71.67 TL 143.35 TL
3 ay 48.71 TL 146.12 TL
6 ay 25.97 TL 155.81 TL
9 ay 18.47 TL 166.20 TL
12 ay 14.95 TL 179.36 TL

Maximum
Maximum

Taksit Taksit Tutarı Toplam Tutar
Tek çekim - 138.50 TL
2 ay 71.67 TL 143.35 TL
3 ay 48.71 TL 146.12 TL
6 ay 25.97 TL 155.81 TL
9 ay 18.47 TL 166.20 TL
12 ay 14.95 TL 179.36 TL

Paraf
Paraf

Taksit Taksit Tutarı Toplam Tutar
Tek çekim - 138.50 TL
2 ay 71.67 TL 143.35 TL
3 ay 48.71 TL 146.12 TL
6 ay 25.97 TL 155.81 TL
9 ay 18.47 TL 166.20 TL
12 ay 14.95 TL 179.36 TL

Kredi Kartı (Tek Çekim)
Kredi Kartı (Tek Çekim)

Taksit Taksit Tutar ı Toplam Tutar
Peşin - 138.50 TL

Bonus, Maximum, Paraf, Cardfinans, Axess ve World özelliği olan tüm kartlar ile ödeme yapılabilir.