Network security essentials : (Record no. 4638)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080717s2007 njua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780132303781
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u5636
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
9 (RLIN) 440
245 10 - TITLE STATEMENT
Title Network security essentials :
Remainder of title applications and standards / William Stallings.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Pearson Education,
Date of publication, distribution, etc. c2007.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 413 p. :
Other physical details ill. ;
Dimensions 24 cm.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 413 p. :
Other physical details ill. ;
Dimensions 24 cm.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface -- 1. Introduction -- 1.1 The OSI Security Architecture -- 1.2 Security Attacks -- 1.3 Security Services -- 1.4 Security Mechanisms -- 1.5 A Model for Internetwork Security -- 1.6 Internet Standards the Internet Society -- 1.7 Outline of This Book -- 1.8 Recommended Reading -- 1.9 Internet and Web Resources -- I. CRYPTOGRAPHY -- 2. Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Encryption Algorithms -- 2.3 Cipher Block Modes of Operation -- 2.4 Location of Encryption Devices -- 2.5 Key Distribution -- 2.6 Recommended Reading and Web Sites -- 2.7 Key Terms, Review Questions, and Problems -- 3. Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions and HMAC .
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 3.3 Public Key Cryptography Principles -- 3.4 Public-Key Cryptography Algorithms -- 3.5 Digital Signatures -- 3.6 Key Management -- 3.7 Recommended Reading and Web Sites -- 3.8 Key Terms, Review Questions, and Problems -- Appendix 3A Prime Numbers and Modular Arithmetic -- II. NETWORK SECURITY APPLICATIONS -- 4. Authentication Applications -- 4.1 Kerberos -- 4.2 X.509 Directory Authentication Service -- 4.3 Public Key Infrastructure -- 4.4 Recommended Reading and Web Sites -- 4.4 Key Terms, Review Questions, and Problems -- Appendix 4A: Kerberos Encryption Techniques -- 5. Electronic Mail Securit -- 5.1 Pretty Good Privacy (PGP) -- 5.2 S/MIME -- 5.3 Recommended Web Sites -- 5.4 Key Terms, Review Questions, and Problems -- Appendix 5A: Data Compression Using ZIP -- Appendix 5B: Radix-64 Conversion -- Appendix 5C: PGP Random Number Generation -- 6. IP Security -- 6.1 IP Security Overview -- 6.2 IP Security Architecture -- 6.3 Authentication Header -- 6.4 Encapsulating Security Payload -- 6.5 Combining Security Associations -- 6.6 Key Management -- 6.7 Recommended Reading and Web Sites .
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 6.8 Key Terms, Review Questions, and Problems -- Appendix 6A: Internetworking and Internet Protocols -- 7. Web Security -- 7.1 Web Security Requirements -- 7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) -- 7.3 Secure Electronic Transaction (SET) -- 7.4 Recommended Reading and Web Sites -- 7.5 Key Terms, Review Questions, and Problems -- 8. Network Management Security -- 8.1 Basic Concepts of SNMP -- 8.2 SNMPv1 Community Facility -- 8.3 SNMPv3 -- 8.4 Recommended Reading and Web Sites -- 8.5 Key Terms, Review Questions, and Problems -- III. SYSTEM SECURITY -- 9. INTRUDERS .
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 9.1 Intruders -- 9.2 Intrusion Detection -- 9.3 Password Management -- 9.4 Recommended Reading and Web Sites -- 9.5 Key Terms, Review Questions, and Problems -- Appendix 9A The Base-Rate Fallacy -- 10. MALICIOUS SOFTWARE -- 10.1 Viruses and Related Threats -- 10.2 Virus Countermeasures -- 10.3 Distributed Denial of Service Attacks -- 10.4 Recommended Reading and Web Sites -- 10.5 Key Terms, Review Questions, and Problems -- 11. FIREWALLS -- 11.1 Firewall Design Principles -- 11.2 Trusted Systems -- 11.3 Common Criteria for Information Technology Security Evaluation -- 11.4 Recommended Reading and Web Sites -- 11.5 Key Terms, Review Questions, and Problems -- APPENDICES -- Standards Cited in this Book -- B. Some Aspects of Number Theory -- B.1 Prime and Relatively Prime Numbers -- B.2 Modular Arithmetic -- C. Projects for Teaching Network Security -- C.1 Research Projects -- C.2 Programming Projects -- C.3 Reading/Report Assignments -- Glossary -- References -- Index -- List of Acronyms.
520 ## - SUMMARY, ETC.
Summary, etc. This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise treatment of the discipline of cryptography, covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. [381]-387). and index.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 11190
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 11191
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 BAC_P   005.8 / ST.N 2007 008298 11/24/2019 1 11/24/2019 Books