Network Security Essentials Applications and Standards

ISBN-10: 0133370437
ISBN-13: 9780133370430
Edition: 5th 2014
List price: $114.00
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager,  More...

eBooks Starting from $22.99
Rent
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $114.00
Edition: 5th
Copyright year: 2014
Publisher: Pearson Education
Publication date: 3/6/2013
Binding: Paperback
Pages: 448
Size: 7.00" wide x 9.00" long x 0.75" tall
Weight: 1.562
Language: English

Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist). A practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.

Online Resources
Preface
About the Author
Introduction
Computer Security Concepts
The OSI Security Architecture
Security Attacks
Security Services
Security Mechanisms
A Model for Network Security
Standards
Outline of This Book
Recommended Reading
Internet and Web Resources
Key Terms, Review Questions, and Problems
Cryptography
Symmetric Encryption and Message Confidentiality
Symmetric Encryption Principles
Symmetric Block Encryption Algorithms
Random and Pseudorandom Numbers
Stream Ciphers and RC4
Cipher Block Modes of Operation
Recommended Reading
Key Terms, Review Questions, and Problems
Public-Key Cryptography and Message Authentication
Approaches to Message Authentication
Secure Hash Functions
Message Authentication Codes
Public-Key Cryptography Principles
Public-Key Cryptography Algorithms
Digital Signatures
Recommended Reading
Key Terms, Review Questions, and Problems
Network Security Applications
Key Distribution and User Authentication
Symmetric Key Distribution Using Symmetric Encryption
Kerberos
Key Distribution Using Asymmetric Encryption
X.509 Certificates
Public-Key Infrastructure
Federated Identity Management
Recommended Reading
Key Terms, Review Questions, and Problems
Network Access Control and Cloud Security
Network Access Control
Extensible Authentication Protocol
IEEE 802.1X Port-Based Network Access Control
Cloud Computing
Cloud Security Risks and Countermeasures
Data Protection in the Cloud
Cloud Security as a Service
Recommended Reading
Key Terms, Review Questions, and Problems
Transport-Level Security
Web Security Considerations
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
HTTPS
Secure Shell (SSH)
Recommended Reading
Key Terms, Review Questions, and Problems
Wireless Network Security
Wireless Security
Mobile Device Security
IEEE 802.11 Wireless LAN Overview
IEEE 802.11i Wireless LAN Security
Recommended Reading
Key Terms, Review Questions, and Problems
Electronic Mail Security
Pretty Good Privacy (PGP)
S/MIME
DomainKeys Identified Mail (DKIM)
Recommended Reading
Key Terms, Review Questions, and Problems
EP Security
IP Security Overview
IP Security Policy
Encapsulating Security Payload
Combining Security Associations
Internet Key Exchange
Cryptographic Suites
Recommended Reading
Key Terms, Review Questions, and Problems
System Security
Malicious Software
Types of Malicious Software (Malware)
Propagation-Infected Content-Viruses
Propagation-Vulnerability-Exploit-Worms
Propagation-Social Engineering-SPAM E-mail, Trojans
Payload-System Corruption
Payload-Attack Agent-Zombie, Bots
Payload-Information Theft-Keyloggers, Phishing, Spyware
Payload-Stealthing-Backdoors, Rootkits
Countermeasures
Distributed Denial of Service Attacks
Recommended Reading
Key Terms, Review Questions, and Problems
Intruders
Intruders
Intrusion Detection
Password Management
Recommended Reading
Key Terms, Review-Questions, and Problems
Firewalls
The Need for Firewalls
Firewall Characteristics
Types of Firewalls
Firewall Basing
Firewall Location and Configurations
Recommended Reading
Key Terms, Review Questions, and Problems
Appendices
Some Aspects of Number Theory
Prime and Relatively Prime Numbers
Modular Arithmetic
Projects for Teaching Network Security
Research Projects
Hacking Project
Programming Projects
Laboratory Exercises
Practical Security Assessments
Firewall Projects
Case Studies
Writing Assignments
Reading/Report Assignments
References
Credits
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×