Product Cover Image

Network Security Essentials: Applications and Standards, CourseSmart eTextbook, 4th Edition

By William Stallings

Published by Prentice Hall

Published Date: Sep 13, 2010

More Product Info

Description

For computer science, computer engineering, and electrical engineering majors taking a one-semester undergraduate courses on network security.

 

A practical survey of network security applications and standards, with unmatched support for instructors and students.

 

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e

provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. 

 

Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography.Network Security, 4e also covers SNMP security, which is not covered in the fifth edition.

 

Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

Table of Contents

About the Author

Preface

Chapter 1        Introduction

            1.1       Computer Security Concepts

            1.2       The OSI Security Architecture

            1.3       Security Attacks

            1.4       Security Services

            1.5       Security Mechanisms

            1.6       A Model for Network Security

            1.7       Standards

            1.8       Outline of This Book

            1.9       Recommended Reading

            1.10     Internet and Web Resources

            1.11     Key Terms, Review Questions, and Problems

 

PART ONE  CRYPTOGRAPHY

 

Chapter 2        Symmetric Encryption and Message Confidentiality

            2.1       Symmetric Encryption Principles

            2.2       Symmetric Block Encryption Algorithms

            2.3       Random and Pseudorandom Numbers

            2.4       Stream Ciphers and RC4

            2.5       Cipher Block Modes of Operation

            2.6       Recommended Reading and Web Sites

            2.7       Key Terms, Review Questions, and Problems

 

Chapter 3        Public-Key Cryptography and Message Authentication

            3.1       Approaches to Message Authentication

            3.2       Secure Hash Functions

            3.3       Message Authentication Codes

            3.4       Public Key Cryptography Principles

            3.5       Public-Key Cryptography Algorithms

            3.6       Digital Signatures

            3.7       Recommended Reading and Web Sites

            3.8       Key Terms, Review Questions, and Problems

 

PART TWO  NETWORK SECURITY APPLICATIONS

 

Chapter 4        Key Distribution and User Authentication

            4.1       Symmetric Key Distribution Using Symmetric Encryption

            4.2       Kerberos

            4.3       Key Distribution Using Asymmetric Encryption

            4.4       X.509 Certificates

            4.5       Public Key Infrastructure

            4.6       Federated Identity Management

            4.7       Recommended Reading and Web Sites

            4.8       Key Terms, Review Questions, and Problems

 

Chapter 5        Transport-Level Security

            5.1       Web Security Issues

            5.2       Secure Sockets Layer (SSL)

            5.3       Transport Layer Security (TLS)

            5.4       HTTPS

            5.5       Secure Shell (SSH)

            5.6       Recommended Reading and Web Sites

            5.7       Key Terms, Review Questions, and Problems

 

Chapter 6        Wireless Network Security

            6.1       IEEE 802.11 Wireless LAN Overview

            6.2       IEEE 802.11i Wireless LAN Security

            6.3       Wireless Application Protocol Overview

            6.4       Wireless Transport Layer Security

            6.5       WAP End-to-End Security

            6.6       Recommended Reading and Web Sites

            6.7       Key Terms, Review Questions, and Problems

 

Chapter 7        Electronic Mail Security

            7.1       Pretty Good Privacy (PGP)

            7.2       S/MIME

            7.3       DomainKeys Identified Mail (DKIM)

            7.4       Recommended Web Sites

            7.5       Key Terms, Review Questions, and Problems

            Appendix 7A: Radix-64 Conversion

 

Chapter 8        IP Security

            8.1       IP Security Overview

            8.2       IP Security Policy

            8.3       Encapsulating Security Payload

            8.4       Combining Security Associations

            8.5       Internet Key Exchange

            8.6       Cryptographic Suites

            8.7       Recommended Reading and Web Sites

            8.8       Key Terms, Review Questions, and Problems

 

PART THREE  SYSTEM SECURITY

 

Chapter 9        Intruders

            9.1       Intruders

            9.2       Intrusion Detection

            9.3       Password Management

            9.4       Recommended Reading and Web Sites

            9.5       Key Terms, Review Questions, and Problems

            Appendix 9A  The Base-Rate Fallacy

 

Chapter 10      Malicious Software

            10.1     Types of Malicious Software

            10.2     Viruses

            10.3     Virus Countermeasures

            10.4     Worms

            10.5     Distributed Denial of Service Attacks

            10.6     Recommended Reading and Web Sites

            10.7     Key Terms, Review Questions, and Problems

 

Chapter 11      Firewalls

            11.1     The Need for Firewalls

            11.2     Firewall Characteristics

            11.3     Types of Firewalls

            11.4     Firewall Basing

            11.5     Firewall Location and Configurations

            11.6     Recommended Reading and Web Sites

            11.7     Key Terms, Review Questions, and Problems

 

APPENDICES

 

Appendix A    Some Aspects of Number Theory

            A.1       Prime and Relatively Prime Numbers

            A.2       Modular Arithmetic

 

Appendix B    Projects for Teaching Network Security

            B.1       Research Projects

            B.2       Hacking Project

            B.3       Programming Projects

            B.4       Laboratory Exercises

            B.5       Practical Security Assessments

            B.6       Writing Assignments

            B.7       Reading/Report Assignments

 

 

ONLINE CHAPTERS

 

Chapter 12      Network Management Security

            12.1     Basic Concepts of SNMP

            12.2     SNMPv1 Community Facility

            12.3     SNMPv3

            12.4     Recommended Reading and Web Sites

            12.5     Key Terms, Review Questions, and Problems

 

Chapter 13      Legal and Ethical Issues

            13.1     Cybercrime and Computer Crime

            13.2     Intellectual Property

            13.3     Privacy

            13.4     Ethical Issues

            13.5     Recommended Reading and Web Sites

            13.6     Key Terms, Review Questions, and Problems

 

 

ONLINE APPENDICES

 

Appendix C    Standards and Standards-Setting Organizations

            C.1       The Importance of Standards

            C.2       Internet Standards and the Internet Society

            C.3       National Institute of Standards and Technology

 

Appendix D    TCP/IP and OSI

            D.1       Protocols and Protocol Architectures

            D.2       The TCP/IP Protocol Architecture

            D.3       The Role of an Internet Protocol

            D.4       IPv4

            D.5       IPv6

            D.6       The OSI Protocol Architecture

 

Appendix E    Pseudorandom Number Generation

            E.1       PRNG Requirements

            E.2       PRNG Using a Block Cipher

            E.3       PRNG Using a Hash Function or Message Authentication Code

 

Appendix F    Kerberos Encryption Techniques

            F.1       Password-to-Key  Transformation

            F.2       Propagating Cipher Block Chaining Mode

 

Appendix G    Data Compression Using ZIP

 

Appendix H    PGP Random Number Generation

 

GLOSSARY

REFERENCES

INDEX

LIST OF ACRONYMS

Purchase Info ?

With CourseSmart eTextbooks and eResources, you save up to 60% off the price of new print textbooks, and can switch between studying online or offline to suit your needs.

Once you have purchased your eTextbooks and added them to your CourseSmart bookshelf, you can access them anytime, anywhere.

Buy Access

Network Security Essentials: Applications and Standards, CourseSmart eTextbook, 4th Edition
Format: Safari Book

$37.80 | ISBN-13: 978-0-13-610810-8