Detail Cantuman
Pencarian SpesifikText
Network Security Essentials: Applications and Standards fourth edition
Chapter 1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Standards
1.8 Outline of This Book
1.9 Recommended Reading
1.10 Internet and Web Resources
1.11 Key Terms, Review Questions, and Problems
PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
2.6 Recommended Reading and Web Sites
2.7 Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Public Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures
3.7 Recommended Reading and Web Sites
3.8 Key Terms, Review Questions, and Problems
PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Key Distribution and User Authentication
4.1 Symmetric Key Distribution Using Symmetric Encryption
4.2 Kerberos
4.3 Key Distribution Using Asymmetric Encryption
4.4 X.509 Certificates
4.5 Public Key Infrastructure
4.6 Federated Identity Management
4.7 Recommended Reading and Web Sites
4.8 Key Terms, Review Questions, and Problems
Chapter 5 Transport-Level Security
5.1 Web Security Issues
5.2 Secure Sockets Layer (SSL)
5.3 Transport Layer Security (TLS)
5.4 HTTPS
5.5 Secure Shell (SSH)
5.6 Recommended Reading and Web Sites
5.7 Key Terms, Review Questions, and Problems
Chapter 6 Wireless Network Security
6.1 IEEE 802.11 Wireless LAN Overview
6.2 IEEE 802.11i Wireless LAN Security
6.3 Wireless Application Protocol Overview
6.4 Wireless Transport Layer Security
6.5 WAP End-to-End Security
6.6 Recommended Reading and Web Sites
6.7 Key Terms, Review Questions, and Problems
Chapter 7 Electronic Mail Security
7.1 Pretty Good Privacy (PGP)
7.2 S/MIME
7.3 DomainKeys Identified Mail (DKIM)
7.4 Recommended Web Sites
7.5 Key Terms, Review Questions, and Problems
Appendix 7A: Radix-64 Conversion
Chapter 8 IP Security
8.1 IP Security Overview
8.2 IP Security Policy
8.3 Encapsulating Security Payload
8.4 Combining Security Associations
8.5 Internet Key Exchange
8.6 Cryptographic Suites
8.7 Recommended Reading and Web Sites
8.8 Key Terms, Review Questions, and Problems
PART THREE SYSTEM SECURITY
Chapter 9 Intruders
9.1 Intruders
9.2 Intrusion Detection
9.3 Password Management
9.4 Recommended Reading and Web Sites
9.5 Key Terms, Review Questions, and Problems
Appendix 9A The Base-Rate Fallacy
Chapter 10 Malicious Software
10.1 Types of Malicious Software
10.2 Viruses
10.3 Virus Countermeasures
10.4 Worms
10.5 Distributed Denial of Service Attacks
10.6 Recommended Reading and Web Sites
10.7 Key Terms, Review Questions, and Problems
Chapter 11 Firewalls
11.1 The Need for Firewalls
11.2 Firewall Characteristics
11.3 Types of Firewalls
11.4 Firewall Basing
11.5 Firewall Location and Configurations
11.6 Recommended Reading and Web Sites
11.7 Key Terms, Review Questions, and Problems
APPENDICES
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
Appendix B Projects for Teaching Network Security
B.1 Research Projects
B.2 Hacking Project
B.3 Programming Projects
B.4 Laboratory Exercises
B.5 Practical Security Assessments
B.6 Writing Assignments
B.7 Reading/Report Assignments
ONLINE CHAPTERS
Chapter 12 Network Management Security
12.1 Basic Concepts of SNMP
12.2 SNMPv1 Community Facility
12.3 SNMPv3
12.4 Recommended Reading and Web Sites
12.5 Key Terms, Review Questions, and Problems
Chapter 13 Legal and Ethical Issues
13.1 Cybercrime and Computer Crime
13.2 Intellectual Property
13.3 Privacy
13.4 Ethical Issues
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
ONLINE APPENDICES
Appendix C Standards and Standards-Setting Organizations
C.1 The Importance of Standards
C.2 Internet Standards and the Internet Society
C.3 National Institute of Standards and Technology
Appendix D TCP/IP and OSI
D.1 Protocols and Protocol Architectures
D.2 The TCP/IP Protocol Architecture
D.3 The Role of an Internet Protocol
D.4 IPv4
D.5 IPv6
D.6 The OSI Protocol Architecture
Appendix E Pseudorandom Number Generation
E.1 PRNG Requirements
E.2 PRNG Using a Block Cipher
E.3 PRNG Using a Hash Function or Message Authentication Code
Appendix F Kerberos Encryption Techniques
F.1 Password-to-Key Transformation
F.2 Propagating Cipher Block Chaining Mode
Appendix G Data Compression Using ZIP
Appendix H PGP Random Number Generation
GLOSSARY
REFERENCES
INDEX
LIST OF ACRONYMS
Ketersediaan
PCT2/2010/PPT/2939 | 004.6 WIL n | My Library (Jaringan) | Tersedia |
PCT2/2010/PPT/2940 | 004.6 WIL n | My Library (Jaringan) | Tersedia |
Informasi Detil
Judul Seri |
-
|
---|---|
No. Panggil |
004.6 WIL n
|
Penerbit | Pearson : New york., 2011 |
Deskripsi Fisik |
-
|
Bahasa |
Indonesia
|
ISBN/ISSN |
978-0-13-706792-3
|
Klasifikasi |
004.6
|
Tipe Isi |
-
|
Tipe Media |
-
|
---|---|
Tipe Pembawa |
-
|
Edisi |
4
|
Subyek | |
Info Detil Spesifik |
-
|
Pernyataan Tanggungjawab |
William Stallings
|
Versi lain/terkait
Tidak tersedia versi lain