MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Network security essentials : applications and standards / William Stallings.

By: Stallings, William.
Material type: materialTypeLabelBookSeries: William Stallings books on computer and data communications technology.Publisher: Upper Saddle River, NJ : Prentice Hall, 2000Description: xiii, 366 p. ; 23 cm. + pbk.ISBN: 0130160938.Subject(s): Computer networks -- Security measures | Computer securityDDC classification: 005.8
Contents:
Introduction -- Part one: Cryptography -- Conventional encryption and message confidentiality -- Public-key cryptography and message authentication -- Part two: Network security applications -- Authentication applications -- Electronic mail security -- IP security -- Web security -- Network management security -- Part three: System security -- Intruders and viruses -- Firewalls.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00080410
Total holds: 0

Enhanced descriptions from Syndetics:

As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking. Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security. Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features. *Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET. *Chapters on Web security and network management security (SNMPv3). *Looks at system-level security issues, including the threat of and countermea

Includes bibliographical references (pages 347-352) and index.

Introduction -- Part one: Cryptography -- Conventional encryption and message confidentiality -- Public-key cryptography and message authentication -- Part two: Network security applications -- Authentication applications -- Electronic mail security -- IP security -- Web security -- Network management security -- Part three: System security -- Intruders and viruses -- Firewalls.

Table of contents provided by Syndetics

  • 1 Introduction
  • I Cryptography
  • 2 Symmetric Encryption and Message Confidentiality
  • 3 Public-Key Cryptography and Message Authentication
  • II Network Security Applications
  • 4 Authentication Applications
  • 5 Electronic Mail Security
  • 6 IP Security
  • 7 Web Security
  • 8 Network Management Security
  • III System Security
  • 9 Intruders
  • 10 Malicious Software
  • 11 Firewalls
  • Appendix A Standards Cited in this Book
  • Appendix B Some Aspects of Number Theory
  • Appendix C Projects for Teaching Network Security
  • Glossary
  • References
  • Index
  • List of Acronyms

Author notes provided by Syndetics

William Stallings is a best-selling author and five-time winner of the annual Text and Academic Authors Association award for best computer science and engineering text. He has authored 17 titles and -- counting revised editions -- 43 books on various aspects of computer networking and computer architecture. Stallings is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He holds a Ph.D. from M.I.T. in computer science and a B.S. from Notre Dame in electrical engineering

Powered by Koha