Higher Ed. and Vocational >> Engineering and Computer Science >> Computer Science >> Computer Science


Network Security Essentials: Applications and Standards, 6/e

Network Security Essentials:  Applications and Standards,  6/e

Author(s):
  • William Stallings
  • Author: William Stallings
    • ISBN:9789352866601
    • 10 Digit ISBN:9352866606
    • Price:Rs. 890.00
    • Pages:472
    • Imprint:Pearson Education
    • Binding:Paperback
    • Status:Available


    Be the first to rate the book !!

    Network Securities Essentials: Applications and Standards introduces students to the critical

    importance of Internet security in our age of universal electronic connectivity. Amidst viruses,

    hackers, and electronic fraud, organizations and individuals are constantly at risk of having their

    private information compromised. This creates a heightened need to protect data and resources

    from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.


    The Sixth Edition covers the expanding developments in the cryptography and network security

    disciplines, giving students a practical survey of applications and standards. The text places emphasis

    on applications widely used for Internet and corporate networks, as well as extensively deployed

    Internet standards.

     

    Table of Content

    1. Introduction
    2. Symmetric Encryption and Message
    3. Public-Key Cryptography and Message
    4. Key Distribution and User Authentication
    5. Network Access Control and Cloud Security
    6. Transport-Level Security
    7. Wireless Network Security
    8. Electronic Mail Security
    9. IP Security
    10. Malicious Software
    11. Intruders
    12. Firewalls
     

    Salient Features

    New to this edition:
    1. Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X
    2. Section on cloud security covers the security issues related to cloud computing
    3. Section on mobile device security introduces this essential aspect of enterprise network security
    4. Thoroughly updated chapter on malicious software focusing on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms