MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
080717s2007 njua b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780132303781 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u5636 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Stallings, William. |
| 9 (RLIN) |
440 |
| 245 10 - TITLE STATEMENT |
| Title |
Network security essentials : |
| Remainder of title |
applications and standards / William Stallings. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
3rd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Upper Saddle River, NJ : |
| Name of publisher, distributor, etc. |
Pearson Education, |
| Date of publication, distribution, etc. |
c2007. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 413 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 413 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Preface -- 1. Introduction -- 1.1 The OSI Security Architecture -- 1.2 Security Attacks -- 1.3 Security Services -- 1.4 Security Mechanisms -- 1.5 A Model for Internetwork Security -- 1.6 Internet Standards the Internet Society -- 1.7 Outline of This Book -- 1.8 Recommended Reading -- 1.9 Internet and Web Resources -- I. CRYPTOGRAPHY -- 2. Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Encryption Algorithms -- 2.3 Cipher Block Modes of Operation -- 2.4 Location of Encryption Devices -- 2.5 Key Distribution -- 2.6 Recommended Reading and Web Sites -- 2.7 Key Terms, Review Questions, and Problems -- 3. Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions and HMAC . |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
3.3 Public Key Cryptography Principles -- 3.4 Public-Key Cryptography Algorithms -- 3.5 Digital Signatures -- 3.6 Key Management -- 3.7 Recommended Reading and Web Sites -- 3.8 Key Terms, Review Questions, and Problems -- Appendix 3A Prime Numbers and Modular Arithmetic -- II. NETWORK SECURITY APPLICATIONS -- 4. Authentication Applications -- 4.1 Kerberos -- 4.2 X.509 Directory Authentication Service -- 4.3 Public Key Infrastructure -- 4.4 Recommended Reading and Web Sites -- 4.4 Key Terms, Review Questions, and Problems -- Appendix 4A: Kerberos Encryption Techniques -- 5. Electronic Mail Securit -- 5.1 Pretty Good Privacy (PGP) -- 5.2 S/MIME -- 5.3 Recommended Web Sites -- 5.4 Key Terms, Review Questions, and Problems -- Appendix 5A: Data Compression Using ZIP -- Appendix 5B: Radix-64 Conversion -- Appendix 5C: PGP Random Number Generation -- 6. IP Security -- 6.1 IP Security Overview -- 6.2 IP Security Architecture -- 6.3 Authentication Header -- 6.4 Encapsulating Security Payload -- 6.5 Combining Security Associations -- 6.6 Key Management -- 6.7 Recommended Reading and Web Sites . |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
6.8 Key Terms, Review Questions, and Problems -- Appendix 6A: Internetworking and Internet Protocols -- 7. Web Security -- 7.1 Web Security Requirements -- 7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) -- 7.3 Secure Electronic Transaction (SET) -- 7.4 Recommended Reading and Web Sites -- 7.5 Key Terms, Review Questions, and Problems -- 8. Network Management Security -- 8.1 Basic Concepts of SNMP -- 8.2 SNMPv1 Community Facility -- 8.3 SNMPv3 -- 8.4 Recommended Reading and Web Sites -- 8.5 Key Terms, Review Questions, and Problems -- III. SYSTEM SECURITY -- 9. INTRUDERS . |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
9.1 Intruders -- 9.2 Intrusion Detection -- 9.3 Password Management -- 9.4 Recommended Reading and Web Sites -- 9.5 Key Terms, Review Questions, and Problems -- Appendix 9A The Base-Rate Fallacy -- 10. MALICIOUS SOFTWARE -- 10.1 Viruses and Related Threats -- 10.2 Virus Countermeasures -- 10.3 Distributed Denial of Service Attacks -- 10.4 Recommended Reading and Web Sites -- 10.5 Key Terms, Review Questions, and Problems -- 11. FIREWALLS -- 11.1 Firewall Design Principles -- 11.2 Trusted Systems -- 11.3 Common Criteria for Information Technology Security Evaluation -- 11.4 Recommended Reading and Web Sites -- 11.5 Key Terms, Review Questions, and Problems -- APPENDICES -- Standards Cited in this Book -- B. Some Aspects of Number Theory -- B.1 Prime and Relatively Prime Numbers -- B.2 Modular Arithmetic -- C. Projects for Teaching Network Security -- C.1 Research Projects -- C.2 Programming Projects -- C.3 Reading/Report Assignments -- Glossary -- References -- Index -- List of Acronyms. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise treatment of the discipline of cryptography, covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references (p. [381]-387). and index. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
11190 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
11191 |