Network security essentials: applications and standards
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Harlow, England
Pearson
[2017]
|
Ausgabe: | Sixth edition, global edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 461 Seiten Illustrationen, Diagramme |
ISBN: | 9781292154855 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043974707 | ||
003 | DE-604 | ||
005 | 20170202 | ||
007 | t | ||
008 | 161221s2017 xxua||| |||| 00||| eng d | ||
020 | |a 9781292154855 |9 978-1-292-15485-5 | ||
035 | |a (OCoLC)972502944 | ||
035 | |a (DE-599)BVBBV043974707 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-573 |a DE-473 |a DE-739 |a DE-20 |a DE-706 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Stallings, William |d 1945- |e Verfasser |0 (DE-588)130436461 |4 aut | |
245 | 1 | 0 | |a Network security essentials |b applications and standards |c William Stallings |
250 | |a Sixth edition, global edition | ||
264 | 1 | |a Harlow, England |b Pearson |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 461 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 0 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029383220&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029383220 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176937712615424 |
---|---|
adam_text | Contents
Preface 10
About the Author 16
Chapter 1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
Introduction 17
Computer Security Concepts 20
The OSI Security Architecture 24
Security Attacks 25
Security Services 27
Security Mechanisms 31
Fundamental Security Design Principles 32
Attack Surfaces and Attack Trees 36
A Model for Network Security 39
Standards 42
Key Terms, Review Questions, and Problems 42
PART ONE: CRYPTOGRAPHY 45
Chapter 2 Symmetric Encryption and Message Confidentiality 45
2.1 Symmetric Encryption Principles 46
2.2 Symmetric Block Encryption Algorithms 52
2.3 Random and Pseudorandom Numbers 59
2.4 Stream Ciphers and RC4 63
2.5 Cipher Block Modes of Operation 68
2.6 Key Terms, Review Questions, and Problems 73
Chapter 3
3.1
3.2
3.3
3.4
3.5
3.6
3.7
Public-Key Cryptography and Message Authentication 78
Approaches to Message Authentication 79
Secure Hash Functions 84
Message Authentication Codes 91
Public-Key Cryptography Principles 96
Public-Key Cryptography Algorithms 100
Digital Signatures 109
Key Terms, Review Questions, and Problems 112
PART TWO: NETWORK SECURITY APPLICATIONS 119
Chapter 4 Key Distribution and User Authentication 119
4.1 Remote User Authentication Principles 120
4.2 Symmetric Key Distribution Using Symmetric Encryption 123
4.3 Kerberos 124
4.4 Key Distribution Using Asymmetric Encryption 137
4.5 X.509 Certificates 139
4.6 Public-Key Infrastructure 146
6 CONTENTS
4.7
4.8
Chapter 5
5.1
5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9
Chapter 6
6.1
6.2
6.3
6.4
6.5
Chapter 7
7.1
7.2
7.3
7.4
7.5
Chapter 8
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
Chapter 9
9.1
9.2
9.3
9.4
9.5
9.6
9.7
Federated Identity Management 149
Key Terms, Review Questions, and Problems 155
Network Access Control and Cloud Security 160
Network Access Control 161
Extensible Authentication Protocol 164
IEEE 802.IX Port-Based Network Access Control 168
Cloud Computing 170
Cloud Security Risks and Countermeasures 176
Data Protection in the Cloud 178
Cloud Security as a Service 182
Addressing Cloud Computing Security Concerns 185
Key Terms, Review Questions, and Problems 186
Transport-Level Security 187
Web Security Considerations 188
Transport Layer Security 190
HTTPS 207
Secure Shell (SSH) 208
Key Terms, Review Questions, and Problems 220
Wireless Network Security 222
Wireless Security 223
Mobile Device Security 226
IEEE 802.11 Wireless LAN Overview 230
IEEE 802.11 i Wireless LAN Security 236
Key Terms, Review Questions, and Problems 251
Electronic Mail Security 253
Internet Mail Architecture 254
E-mail Formats 258
E-mail Threats and Comprehensive E-mail Security 266
S/MIME 268
Pretty Good Privacy 279
DNSSEC 280
DNS-Based Authentication of Named Entities 285
Sender Policy Framework 286
DomainKeys Identified Mail 289
Domain-Based Message Authentication, Reporting, and Conformance 295
Key Terms, Review Questions, and Problems 300
IP Security 302
IP Security Overview 303
IP Security Policy 309
Encapsulating Security Payload 314
Combining Security Associations 322
Internet Key Exchange 325
Cryptographic Suites 333
Key Terms, Review Questions, and Problems 335
f
CONTENTS
PART THREE: SYSTEM SECURITY 337
Chapter 10 Malicious Software 337
10.1
10.2
10.3
10.4
10.5
10.6
10.7
10.8
10.9
10.10
10.11
10.12
Types of Malicious Software (Malware) 338
Advanced Persistent Threat 341
Propagation—Infected Content—-Viruses 342
Propagation—Vulnerability Exploit-—-Worms 347
Propagation—Social Engineering—Spam E-mail, Trojans 353
Payload—System Corruption 355
Payload—Attack Agent—Zombie, Bots 356
Payload—Information Theft—Keyloggers, Phishing, Spyware 357
Payload-—-Stealthing—Backdoors, Rootkits 359
Countermeasures 360
Distributed Denial of Service Attacks 367
Key Terms, Review Questions, and Problems 372
Chapter 11 Intruders 375
11.1 Intruders 376
11.2 Intrusion Detection 381
11.3 Password Management 396
11.4 Key Terms, Review Questions, and Problems 406
Chapter 12 Firewalls 410
12.1 The Need for Firewalls 411
12.2 Firewall Characteristics and Access Policy 412
12.3 Types of Firewalls 414
12.4 Firewall Basing 420
12.5 Firewall Location and Configurations 423
12.6 Key Terms, Review Questions, and Problems 428
APPENDICES 432
Appendix A Some Aspects of Number Theory 432
A.l Prime and Relatively Prime Numbers 433
A. 2 Modular Arithmetic 435
Appendix B Projects for Teaching Network Security 437
B. l Research Projects 438
B.2 Hacking Project 439
B.3 Programming Projects 439
B.4 Laboratory Exercises 440
B.5 Practical Security Assessments 440
B.6 Firewall Projects 440
B.7 Case Studies 441
B.8 Writing Assignments 441
B.9 Reading/Report Assignments 441
References 442
Credits 448
Index 450
|
any_adam_object | 1 |
author | Stallings, William 1945- |
author_GND | (DE-588)130436461 |
author_facet | Stallings, William 1945- |
author_role | aut |
author_sort | Stallings, William 1945- |
author_variant | w s ws |
building | Verbundindex |
bvnumber | BV043974707 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)972502944 (DE-599)BVBBV043974707 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Sixth edition, global edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02189nam a2200541zc 4500</leader><controlfield tag="001">BV043974707</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170202 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">161221s2017 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781292154855</subfield><subfield code="9">978-1-292-15485-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)972502944</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043974707</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stallings, William</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130436461</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security essentials</subfield><subfield code="b">applications and standards</subfield><subfield code="c">William Stallings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Sixth edition, global edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Harlow, England</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">461 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029383220&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029383220</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043974707 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:40:07Z |
institution | BVB |
isbn | 9781292154855 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029383220 |
oclc_num | 972502944 |
open_access_boolean | |
owner | DE-1050 DE-573 DE-473 DE-BY-UBG DE-739 DE-20 DE-706 |
owner_facet | DE-1050 DE-573 DE-473 DE-BY-UBG DE-739 DE-20 DE-706 |
physical | 461 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Pearson |
record_format | marc |
spelling | Stallings, William 1945- Verfasser (DE-588)130436461 aut Network security essentials applications and standards William Stallings Sixth edition, global edition Harlow, England Pearson [2017] © 2017 461 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Computer security Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Netzwerk (DE-588)4171529-9 s Datenverarbeitung (DE-588)4011152-0 s Sicherheit (DE-588)4054790-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Rechnernetz (DE-588)4070085-9 s 1\p DE-604 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029383220&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Stallings, William 1945- Network security essentials applications and standards Computer networks Security measures Computer security Datenverarbeitung (DE-588)4011152-0 gnd Netzwerk (DE-588)4171529-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011152-0 (DE-588)4171529-9 (DE-588)4274324-2 (DE-588)4054790-5 (DE-588)4070085-9 |
title | Network security essentials applications and standards |
title_auth | Network security essentials applications and standards |
title_exact_search | Network security essentials applications and standards |
title_full | Network security essentials applications and standards William Stallings |
title_fullStr | Network security essentials applications and standards William Stallings |
title_full_unstemmed | Network security essentials applications and standards William Stallings |
title_short | Network security essentials |
title_sort | network security essentials applications and standards |
title_sub | applications and standards |
topic | Computer networks Security measures Computer security Datenverarbeitung (DE-588)4011152-0 gnd Netzwerk (DE-588)4171529-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks Security measures Computer security Datenverarbeitung Netzwerk Computersicherheit Sicherheit Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029383220&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stallingswilliam networksecurityessentialsapplicationsandstandards |