Skip to:Content
|
Bottom
Cover image for Network security essentials : applications and standards
Title:
Network security essentials : applications and standards
Personal Author:
Edition:
4th ed.
Publication Information:
Upper Saddle River, NJ : Pearson Prentice Hall, 2011
Physical Description:
xiv, 417 p. : ill. ; 23 cm.
ISBN:
9780136108054

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010221726 TK5105.59 S72 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

This is the only book that provides integrated, comprehensive, up-to-date coverage of Internet-based security tools and applications. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount.Network Security: Applications and Standards, 4/eprovides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. Adapted fromCryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography and coverage of SNMP security. CRYPTOGRAPHY; Symmetric Encryption and Message Confidentiality; Public-Key Cryptography and Message Authentication; NETWORK SECURITY APPLICATIONS; Key Distribution and User Authentication; Transport-Level Security; Wireless Network Security; Electronic Mail Security; IP Security; SYSTEM SECURITY; Intruders; Malicious Software; Firewalls; Aspects of Number Theory; Network Management Security; Legal and Ethical Issues; Standards and Standards-Setting Organizations; TCP/IP and OSI; Pseudorandom Number Generation; Kerberos Encryption Techniques; Data Compression Using ZIP; PGP Random Number Generation. Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist).


Author Notes

William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 35 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.


He has received the prize for best Computer Science and Engineering textbook of the year from the Textbook and Academic Authors Association six times.


Bill has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.


Dr. Stallings holds a Ph.D. from M.I.T. in Computer Science and a B.S. from Notre Dame in Electrical Engineering.


Go to:Top of Page