N° de ref. de la librería
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography–covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
From the Inside Flap: Preface In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. Objectives It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed. Intended Audience The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study. Plan of the Book The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols
report underlying network security applications, including encryption, hash functions,
digital signatures, and key exchange.
See Appen~ II.
Network Security Applications: Covers important network security tools and
applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu-
rity, SSL/TLS, SET, and SNMPv3. III.
System Security: Looks at system-level security issues, including the threat of
and countermeasures for intruders and viruses, and the use of firewalls and
trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~
(CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used
detailed anInternet Services for Instructors and Students There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at shore/-ws/NetSec.html. An Internet mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author. As soon as typos or other errors are discovered, an errata list for this book will be available at shore/-ws. Projects for Teaching Network Security For many instructors, an important component of a cryptography or security course is a project or set of projects by which the student gets hands-on experience to rein force concepts from the text. This book provides an unparalleled degree of support for including a projects component in the course. The instructor's manual not only includes guidance on how to assign and structure the projects, but also includes a set of suggested projects that covers a broad range of topics from the text:
· Research Projects: A series of research assignments that instruct the student
to research a particular topic on the Internet and write a report. ·
Programming Projects: A series of programming projects that cover a broad range of topics and that can be implemented in any suitable language on any platform. ·
Reading/Report Assignments: A list of papers in the literature, one for each chapter, that can be assigned for the student to read and then write a short report. See Appendix B for details. Realtionship to Crytography and Network Security, Second Edition This book is on spin-off from Cryptography and Network Security, Second Edition (CNS2e). CNS2e provides a substantial treatment of cryptography, including detailed analysis of algorithms and a significant mathematical component, the whole of which covers over 300 pages. Network Security Essentials: Applications and Standards (NSEle) provides instead a concise overview of these topics in Chapters 2 and 3. NSEle includes all of the remaining material of CNS2e, with updates. NSEle also covers SNMP security, which is not covered in CNS2e. Thus, NSEle is intended for college courses and professional readers where the interest is primarily in the application of network security, without the need or desire to delve deeply in to cryptographic theory and principles.
Condición del libro: New
Descripción Prentice Hall, 2007. Estado de conservación: Good. 3rd. Shows some signs of wear, and may have some markings on the inside. Nº de ref. de la librería GRP2559241
Descripción Prentice Hall, 2007. Estado de conservación: Fair. 3rd. Shows definite wear, and perhaps considerable marking on inside. Nº de ref. de la librería GRP90342639
Descripción Prentice Hall, 2007. Estado de conservación: Good. 3rd. Former Library book. Shows some signs of wear, and may have some markings on the inside. Nº de ref. de la librería GRP57186111
Descripción Prentice Hall, 2007. Estado de conservación: Good. 3rd. Ships from Reno, NV. Former Library book. Shows some signs of wear, and may have some markings on the inside. Nº de ref. de la librería GRP91545591
Descripción Prentice Hall. Paperback. Estado de conservación: GOOD. Gently used may contain ex-library markings, possibly has some minor highlighting, textual notations, and or underlining. Text is still easily readable. Nº de ref. de la librería 2748982139
Descripción Prentice Hall. Paperback. Estado de conservación: GOOD. Good clean copy with no missing pages might be an ex library copy; Possibly may have minor marginal notes and or highlighting. Nº de ref. de la librería 2790892769
Descripción Prentice Hall. Paperback. Estado de conservación: VERY GOOD. little to no wear, pages are clean. The cover and binding are crisp with next no creases. Nº de ref. de la librería 2798979515
Descripción Prentice Hall, 2007. Estado de conservación: Good. 3rd. Ships from the UK. Former Library book. Shows some signs of wear, and may have some markings on the inside. Nº de ref. de la librería GRP72107957
Descripción -. Paperback. Estado de conservación: Very Good. Network Security Essentials: Applications and Standards This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Nº de ref. de la librería 7719-9780132380331
Descripción Pearson 19/07/2006, 2006. Estado de conservación: used-good. Will be shipped promptly from UK warehouse. Book is in good condition with no missing pages, no damage or soiling and tight spine. There may be some dog-eared pages showing previous use but overall a great book. Nº de ref. de la librería 9053-9780132380331