Network security essentials : applications and standards / William Stallings.
Idioma: Inglés Detalles de publicación: Boston : Prentice Hall, 2011.Edición: 4thDescripción: 417 pTipo de contenido:- texto
- sin mediación
- volumen
- 9780136108054
Tipo de ítem | Biblioteca actual | Signatura topográfica | Estado | Fecha de vencimiento | Código de barras | Reserva de ítems | |
---|---|---|---|---|---|---|---|
Libro | Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" | 004.056 ST19 (Navegar estantería(Abre debajo)) | Sólo Consulta | 10332 |
Navegando Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" estanterías Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
004.056 P832 Seguridad informática / | 004.056 P832g Gestión de la seguridad informática / | 004.056 SP49 Honeypots : | 004.056 ST19 Network security essentials : | 004.056 ST19f Fundamentos de seguridad en redes : | 004.056.55 H183 Coding and information theory / | 004.056.55 L964 Introducao a criptografia computacional / |
CONTENIDO
Preface ix
About the Author xiv
Chapter 1 Introduction 1
1.1 Computer Security Concepts 3
1.2 The OSI Security Architecture 8
1.3 Security Attacks 9
1.4 Security Services 13
1.5 Security Mechanisms 16
1.6 A Model for Network Security 19
1.7 Standards 21
1.8 Outline of This Book 21
PART ONE CRYPTOGRAPHY 27
Chapter 2 Symmetric Encryption and Message Confidentiality 27
2.1 Symmetric Encryption Principles 28
2.2 Symmetric Block Encryption Algorithms 34
2.3 Random and Pseudorandom Numbers 42
2.4 Stream Ciphers and RC4 45
2.5 Cipher Block Modes of Operation 50
Chapter 3 Public-Key Cryptography and Message Authentication 61
3.1 Approaches to Message Authentication 62
3.2 Secure Hash Functions 67
3.3 Message Authentication Codes 73
3.4 Public-Key Cryptography Principles 79
3.5 Public-Key Cryptography Algorithms 83
3.6 Digital Signatures 90
PART TWO NETWORK SECURITY APPLICATIONS 97
Chapter 4 Key Distribution and User Authentication 97
4.1 Symmetric Key Distribution Using Symmetric Encryption 98
4.2 Kerberos 99
4.3 Key Distribution Using Asymmetric Encryption 114
4.4 X.509 Certificates 116
4.5 Public-Key Infrastructure 124
4.6 Federated Identity Management 126
Chapter 5 Transport-Level Security 139
5.1 Web Security Considerations 140
5.2 Secure Socket Layer and Transport Layer Security 143
5.3 Transport Layer Security 156
5.4 HTTPS 160
5.5 Secure Shell (SSH) 162
Chapter 6 Wireless Network Security 175
6.1 IEEE 802.11 Wireless LAN Overview 177
6.2 IEEE 802.11i Wireless LAN Security 183
6.3 Wireless Application Protocol Overview 197
6.4 Wireless Transport Layer Security 204
6.5 WAP End-to-End Security 214
Chapter 7 Electronic Mail Security 221
7.1 Pretty Good Privacy 222
7.2 S/MIME 241
7.3 DomainKeys Identified Mail 257
Chapter 8 IP Security 269
8.1 IP Security Overview 270
8.2 IP Security Policy 276
8.3 Encapsulating Security Payload 281
8.4 Combining Security Associations 288
8.5 Internet Key Exchange 292
8.6 Cryptographic Suites 301
PART THREE SYSTEM SECURITY 305
Chapter 9 Intruders 305
9.1 Intruders 307
9.2 Intrusion Detection 312
9.3 Password Management 323
Appendix 9A The Base-Rate Fallacy 337
Chapter 10 Malicious Software 340
10.1 Types of Malicious Software 341
10.2 Viruses 346
10.3 Virus Countermeasures 351
10.4 Worms 356
10.5 Distributed Denial of Service Attacks 365
Chapter 11 Firewalls 374
11.1 The Need for Firewalls 375
11.2 Firewall Characteristics 376
11.3 Types of Firewalls 378
11.4 Firewall Basing 385
11.5 Firewall Location and Configurations 388
11. APPENDICES 398
Appendix A Some Aspects of Number Theory 398
A.1 Prime and Relatively Prime Numbers 399
A.2 Modular Arithmetic 401
Appendix B Projects for Teaching Network Security 403
B.1 Research Projects 404
B.2 Hacking Project 405
B.3 Programming Projects 405
B.4 Laboratory Exercises 406
B.5 Practical Security Assessments 406
B.6 Writing Assignments 406
B.7 Reading/Report Assignments 407
Index 408
No hay comentarios en este titulo.