ISBN-10:
0130160938
ISBN-13:
9780130160935
Pub. Date:
11/23/1999
Publisher:
Pearson Education
Network Security Essentials : Applications and Standards / Edition 1

Network Security Essentials : Applications and Standards / Edition 1

by William Stallings

Hardcover

Current price is , Original price is $45.0. You

Temporarily Out of Stock Online

Please check back later for updated availability.

This item is available online through Marketplace sellers.

Overview

As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking.

Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security.

Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features.

  • Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET.
  • Chapters on Web security and network management security (SNMPv3).
  • Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.
  • On-line transparency masters, an Internet mailing list, and links to relevant Web sites are available at <...

Product Details

ISBN-13: 9780130160935
Publisher: Pearson Education
Publication date: 11/23/1999
Edition description: Older Edition
Pages: 366
Product dimensions: 7.00(w) x 9.16(h) x 0.71(d)

About the Author


William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 17 titles, and counting revised editions, a total of 42 books on various aspects of these subjects. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. Dr. Stallings holds a Ph.D. from M.I.T in Computer Science and a B.S. from Notre Dame in Electrical Engineering.

Read an Excerpt

PREFACE:

Preface

In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

Objectives

It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed.

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study.

Plan of the Book

The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i report underlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh

Internet Services for Instructors and Students

There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...

Table of Contents

Preface xi
Introduction
1(18)
Attacks, Services, and Mechanisms
4(2)
Security Attacks
6(3)
Security Services
9(2)
A Model for Internetwork Security
11(2)
Internet Standards and RFCs
13(3)
Recommended Reading
16(3)
Appendix 1A: Internet and Web Resources
16(3)
PART ONE CRYPTOGRAPHY 19(62)
Conventional Encryption and Message Confidentiality
21(26)
Conventional Encryption Principles
22(6)
Conventional Encryption Algorithms
28(9)
Cipher Block Modes of Operation
37(2)
Location of Encryption Devices
39(3)
Key Distribution
42(2)
Recommended Reading
44(1)
Problems
44(3)
Public-Key Cryptography and Message Authentication
47(34)
Approaches to Message Authentication
48(4)
Secure Hash Functions and HMAC
52(10)
Public Key Cryptography Principles
62(4)
Public-Key Cryptography Algorithms
66(6)
Digital Signatures
72(1)
Key Management
73(2)
Recommended Reading
75(1)
Problems
75(6)
Appendix 3A: Prime Numbers and Modular Arithmetic
77(4)
PART TWO NETWORK SECURITY APPLICATIONS 81(196)
Authentication Applications
83(34)
Kerberos
84(17)
X.509 Directory Authentication Service
101(9)
Recommended Reading and Web Sites
110(1)
Problems
110(7)
Appendix 4A: Kerberos Encryption Techniques
111(6)
Electronic Mail Security
117(44)
Pretty Good Privacy (PGP)
118(18)
S/MIME
136(16)
Recommended Web Sites
152(1)
Problems
152(9)
Appendix 5A: Data Compression Using ZIP
153(2)
Appendix 5B: Radix-64 Conversion
155(2)
Appendix 5C: PGP Random Number Generation
157(4)
IP Security
161(42)
IP Security Overview
162(3)
IP Security Architecture
165(6)
Authentication Header
171(5)
Encapsulating Security Payload
176(5)
Combining Security Associations
181(3)
Key Management
184(9)
Recommended Reading and Web Sites
193(1)
Problems
194(9)
Appendix 6A: Internetworking and Internet Protocols
194(9)
Web Security
203(34)
Web Security Requirements
204(2)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
206(17)
Secure Electronic Transaction (SET)
223(12)
Recommended Reading and Web Sites
235(1)
Problems
235(2)
Network Management Security
237(40)
Basic Concepts of SNMP
238(8)
SNMPv1 Community Facility
246(2)
SNMPv3
248(25)
Recommended Reading and Web Sites
273(1)
Problems
274(3)
PART THREE SYSTEM SECURITY 277(60)
Intruders and Viruses
279(40)
Intruders
280(23)
Viruses and Related Threats
303(13)
Recommended Reading and Web Sites
316(1)
Problems
317(2)
Firewalls
319(18)
Firewall Design Principles
320(10)
Trusted Systems
330(6)
Recommended Reading
336(1)
Problems
336(1)
APPENDIX A RFCs Cited in this Book 337(2)
APPENDIX B Projects for Teaching Network Security 339(2)
B.1 Research Projects
339(1)
B.2 Programming Projects
340(1)
B.3 Reading/Report Assignments
340(1)
Glossary 341(6)
References 347(6)
Index 353

Preface

PREFACE:

Preface

In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

Objectives

It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed.

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study.

Plan of the Book

The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i reportunderlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh

Internet Services for Instructors and Students

There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews