Network security essentials: applications and standards
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Harlow
Prentice Hall
2011
|
Ausgabe: | 4. ed., International ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 431 S. graph. Darst. |
ISBN: | 9780136108054 0137067925 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036478773 | ||
003 | DE-604 | ||
005 | 20101116 | ||
007 | t | ||
008 | 100601s2011 d||| |||| 00||| eng d | ||
015 | |a GBB043524 |2 dnb | ||
020 | |a 9780136108054 |9 978-0-13-610805-4 | ||
020 | |a 0137067925 |c pbk. |9 0-13-706792-5 | ||
020 | |z 0136108059 |c pbk |9 0-13-610805-9 | ||
020 | |z 9780137067923 |c pbk. |9 978-0-13-706792-3 | ||
035 | |a (OCoLC)699548849 | ||
035 | |a (DE-599)BVBBV036478773 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-739 |a DE-83 |a DE-522 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Stallings, William |d 1945- |e Verfasser |0 (DE-588)130436461 |4 aut | |
245 | 1 | 0 | |a Network security essentials |b applications and standards |c William Stallings |
250 | |a 4. ed., International ed. | ||
264 | 1 | |a Harlow |b Prentice Hall |c 2011 | |
300 | |a 431 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 1 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020350326&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020350326 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804142978282815488 |
---|---|
adam_text | Contents
Preface
ix
About the
Author
xiv
Chapter
1
Introduction
1
1.1
Computer Security Concepts
3
1.2
The
OSI
Security Architecture
8
1.3
Security Attacks
9
1.4
Security Services
13
1.5
Security Mechanisms
16
1.6
A Model for Network Security
19
1.7
Standards
21
1.8
Outline of This Book
21
1.9
Recommended Reading
22
1.10
Internet and Web Resources
23
1.11
Key Terms, Review Questions, and Problems
25
PART ONE CRYPTOGRAPHY
27
Chapter
2
Symmetric Encryption and Message Confidentiality
27
2.1
Symmetric Encryption Principles
28
2.2
Symmetric Block Encryption Algorithms
34
2.3
Random and Pseudorandom Numbers
42
2.4
Stream Ciphers and RC4
45
2.5
Cipher Block Modes of Operation
50
2.6
Recommended Reading and Web Sites
55
2.7
Key Terms, Review Questions, and Problems
56
Chapter
3
Public-Key Cryptography and Message Authentication
61
3.1
Approaches to Message Authentication
62
3.2
Secure Hash Functions
67
3.3
Message Authentication Codes
73
3.4
Public-Key Cryptography Principles
79
3.5
Public-Key Cryptography Algorithms
83
3.6
Digital Signatures
90
3.7
Recommended Reading and Web Sites
90
3.8
Key Terms, Review Questions, and Problems
91
PART TWO NETWORK SECURITY APPLICATIONS
97
Chapter
4
Key Distribution and User Authentication
97
4.1
Symmetric Key Distribution Using Symmetric Encryption
98
4.2 Kerberos 99
4.3
Key Distribution Using Asymmetric Encryption
114
4.4
X.509 Certificates
116
4.5
Public-Key Infrastructure
124
4.6
Federated
Identity Management
126
4.7
Recommended Reading and Web Sites
132
4.8
Key Terms, Review Questions, and Problems
133
Chapter
5
Transport-Level Security
139
5.1
Web Security Considerations
140
5.2
Secure Socket Layer and Transport Layer Security
143
5.3
Transport Layer Security
156
5.4
HTTPS
160
5.5
Secure Shell (SSH)
162
5.6
Recommended Reading and Web Sites
173
5.7
Key Terms, Review Questions, and Problems
173
Chapter
6
Wireless Network Security
175
6.1
IEEE
802.
И
Wireless LAN Overview
177
6.2
IEEE
802.1
li
Wireless LAN Security
183
6.3
Wireless Application Protocol Overview
197
6.4
Wireless Transport Layer Security
204
6.5
WAP End-to-End Security
214
6.6
Recommended Reading and Web Sites
217
6.7
Key Terms, Review Questions, and Problems
218
Chapter
7
Electronic Mail Security
221
7.1
Pretty Good Privacy
222
7.2
S/MIME
241
7.3
DomainKeys Identified Mail
257
7.4
Recommended Reading and Web Sites
264
7.5
Key Terms, Review Questions, and Problems
265
Appendix 7A Radix-64 Conversion
266
Chapter
8
IP Security
269
8.1
IP Security Overview
270
8.2
IP Security Policy
276
8.3
Encapsulating Security Payload
281
8.4
Combining Security Associations
288
8.5
Internet Key Exchange
292
8.6
Cryptographic Suites
301
8.7
Recommended Reading and Web Sites
302
8.8
Key Terms, Review Questions, and Problems
303
PART THREE SYSTEM SECURITY
305
Chapter
9
Intruders
305
9.1
Intruders
307
9.2
Intrusion Detection
312
9.3
Password Management
323
9.4
Recommended Reading and Web Sites
333
9.5
Key Terms, Review Questions, and Problems
334
Appendix
9
A The Base-Rate Fallacy
337
Chapter
10
Malicious Software
340
10.1
Types of Malicious Software
341
10.2
Viruses
346
10.3
Virus Countermeasures
351
10.4
Worms
356
10.5
Distributed Denial of Service Attacks
365
10.6
Recommended Reading and Web Sites
370
10.7
Key Terms, Review Questions, and Problems
371
Chapter
11
Firewalls
374
11.1
The Need for Firewalls
375
11.2
Firewall Characteristics
376
11.3
Types of Firewalls
378
11.4
Firewall Basing
385
11.5
Firewall Location and Configurations
388
11.6
Recommended Reading and Web Site
393
11.7
Key Terms, Review Questions, and Problems
394
APPENDICES
398
Appendix A Some Aspects of Number Theory
398
A.
1
Prime and Relatively Prime Numbers
399
A.2 Modular Arithmetic
401
Appendix
В
Projects for Teaching Network Security
403
B.I Research Projects
404
B.2 Hacking Project
405
B.3 Programming Projects
405
B.4 Laboratory Exercises
406
B.5 Practical Security Assessments
406
B.6 Writing Assignments
406
B.7 Reading/Report Assignments
407
Index
408
ONLINE CHAPTERS
Chapter
12
Network Management Security
12.1
Basic Concepts of
SNMP
12.2
SNMPvl Community Facility
12.3
SNMPv3
12.4
Recommended Reading and Web Sites
12.5
Key Terms, Review Questions, and Problems
Chapter
13
Legal and Ethical Aspects
13.1
Cybercrime and Computer Crime
13.2
Intellectual Property
13.3
Privacy
13.4
Ethical Issues
13.5
Recommended Reading and Web Sites
13.6
Key Terms, Review Questions, and Problems
ONLINE APPENDICES
Appendix
С
Standards and Standards-Setting Organizations
C.
1
The Importance of Standards
C.2 Internet Standards and the Internet Society
C.3 National Institute of Standards and Technology
Appendix
D
TCP/IP and
OSI
D.I Protocols and Protocol Architectures
D.2 The TCP/IP Protocol Architecture
D.3 The Role of an Internet Protocol
D.4
IPv4
D.5
IPv6
D.6 The
OSI
Protocol Architecture
Appendix
E
Pseudorandom Number Generation
E.I PRNG Requirements
E.2 PRNG Using a Block Cipher
E.3 PRNG Using a Hash Function or Message Authentication Code
Appendix
F
Kerberos
Encryption Techniques
F.
1
Password-to-Key Transformation
F.2 Propagating Cipher Block Chaining Mode
Appendix
G Data
Compression Using ZIP
G.I Compression Algorithm
G.2 Decompression Algorithm
Appendix
H PGP
Random Number Generation
H.I True Random Numbers
H.2 Pseudorandom Numbers
Appendix I The International Reference Alphabet
Glossary
References
|
any_adam_object | 1 |
author | Stallings, William 1945- |
author_GND | (DE-588)130436461 |
author_facet | Stallings, William 1945- |
author_role | aut |
author_sort | Stallings, William 1945- |
author_variant | w s ws |
building | Verbundindex |
bvnumber | BV036478773 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)699548849 (DE-599)BVBBV036478773 |
discipline | Informatik |
edition | 4. ed., International ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02127nam a2200517 c 4500</leader><controlfield tag="001">BV036478773</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101116 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100601s2011 d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB043524</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780136108054</subfield><subfield code="9">978-0-13-610805-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0137067925</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-13-706792-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0136108059</subfield><subfield code="c">pbk</subfield><subfield code="9">0-13-610805-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780137067923</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-13-706792-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699548849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036478773</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stallings, William</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130436461</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security essentials</subfield><subfield code="b">applications and standards</subfield><subfield code="c">William Stallings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed., International ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Harlow</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">431 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020350326&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020350326</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV036478773 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:40:21Z |
institution | BVB |
isbn | 9780136108054 0137067925 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020350326 |
oclc_num | 699548849 |
open_access_boolean | |
owner | DE-634 DE-739 DE-83 DE-522 |
owner_facet | DE-634 DE-739 DE-83 DE-522 |
physical | 431 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Prentice Hall |
record_format | marc |
spelling | Stallings, William 1945- Verfasser (DE-588)130436461 aut Network security essentials applications and standards William Stallings 4. ed., International ed. Harlow Prentice Hall 2011 431 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer networks / Security measures Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Netzwerk (DE-588)4171529-9 s Datenverarbeitung (DE-588)4011152-0 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020350326&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Stallings, William 1945- Network security essentials applications and standards Computer networks / Security measures Datenverarbeitung (DE-588)4011152-0 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd Netzwerk (DE-588)4171529-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011152-0 (DE-588)4054790-5 (DE-588)4070085-9 (DE-588)4171529-9 (DE-588)4274324-2 |
title | Network security essentials applications and standards |
title_auth | Network security essentials applications and standards |
title_exact_search | Network security essentials applications and standards |
title_full | Network security essentials applications and standards William Stallings |
title_fullStr | Network security essentials applications and standards William Stallings |
title_full_unstemmed | Network security essentials applications and standards William Stallings |
title_short | Network security essentials |
title_sort | network security essentials applications and standards |
title_sub | applications and standards |
topic | Computer networks / Security measures Datenverarbeitung (DE-588)4011152-0 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd Netzwerk (DE-588)4171529-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks / Security measures Datenverarbeitung Sicherheit Rechnernetz Netzwerk Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020350326&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stallingswilliam networksecurityessentialsapplicationsandstandards |