Network Security Essentials. (Record no. 25636)

MARC details
000 -LEADER
fixed length control field 05863nam a22003493i 4500
001 - CONTROL NUMBER
control field EBC5127073
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190107114559.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2010 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131739723
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5127073
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5127073
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL264579
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024261062
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
245 10 - TITLE STATEMENT
Title Network Security Essentials.
250 ## - EDITION STATEMENT
Edition statement 4th ed.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (518 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Contents -- Preface -- About the Author -- Chapter 1 Introduction -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network -- 1.7 Standards -- 1.8 Outline of This Book -- 1.9 Recommended Reading -- 1.10 Internet and Web Resources -- 1.11 Key Terms, Review Questions, and Problems -- PART ONE: CRYPTOGRAPHY -- Chapter 2 Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Block Encryption Algorithms -- 2.3 Random and Pseudorandom Numbers -- 2.4 Stream Ciphers and RC4 -- 2.5 Cipher Block Modes of Operation -- 2.6 Recommended Reading and Web Sites -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions -- 3.3 Message Authentication Codes -- 3.4 Public-Key Cryptography Principles -- 3.5 Public-Key Cryptography Algorithms -- 3.6 Digital Signatures -- 3.7 Recommended Reading and Web Sites -- 3.8 Key Terms, Review Questions, and Problems -- PART TWO: NETWORK SECURITY APPLICATIONS -- Chapter 4 Key Distribution and User Authentication -- 4.1 Symmetric Key Distribution Using Symmetric Encryption -- 4.2 Kerberos -- 4.3 Key Distribution Using Asymmetric Encryption -- 4.4 X.509 Certificates -- 4.5 Public-Key Infrastructure -- 4.6 Federated Identity Management -- 4.7 Recommended Reading and Web Sites -- 4.8 Key Terms, Review Questions, and Problems -- Chapter 5 Transport-Level Security -- 5.1 Web Security Considerations -- 5.2 Secure Socket Layer and Transport Layer Security -- 5.3 Transport Layer Security -- 5.4 HTTPS -- 5.5 Secure Shell (SSH) -- 5.6 Recommended Reading and Web Sites -- 5.7 Key Terms, Review Questions, and Problems.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6 Wireless Network Security -- 6.1 IEEE 802.11 Wireless LAN Overview -- 6.2 IEEE 802.11i Wireless LAN Security -- 6.3 Wireless Application Protocol Overview -- 6.4 Wireless Transport Layer Security -- 6.5 WAP End-to-End Security -- 6.6 Recommended Reading and Web Sites -- 6.7 Key Terms, Review Questions, and Problems -- Chapter 7 Electronic Mail Security -- 7.1 Pretty Good Privacy -- 7.2 S/MIME -- 7.3 DomainKeys Identified Mail -- 7.4 Recommended Reading and Web Sites -- 7.5 Key Terms, Review Questions, and Problems -- Appendix 7A: Radix-64 Conversion -- Chapter 8 IP Security -- 8.1 IP Security Overview -- 8.2 IP Security Policy -- 8.3 Encapsulating Security Payload -- 8.4 Combining Security Associations -- 8.5 Internet Key Exchange -- 8.6 Cryptographic Suites -- 8.7 Recommended Reading and Web Sites -- 8.8 Key Terms, Review Questions, and Problems -- PART THREE: SYSTEM SECURITY -- Chapter 9 Intruders -- 9.1 Intruders -- 9.2 Intrusion Detection -- 9.3 Password Management -- 9.4 Recommended Reading and Web Sites -- 9.5 Key Terms, Review Questions, and Problems -- Appendix 9A: The Base-Rate Fallacy -- Chapter 10 Malicious Software -- 10.1 Types of Malicious Software -- 10.2 Viruses -- 10.3 Virus Countermeasures -- 10.4 Worms -- 10.5 Distributed Denial of Service Attacks -- 10.6 Recommended Reading and Web Sites -- 10.7 Key Terms, Review Questions, and Problems -- Chapter 11 Firewalls -- 11.1 The Need for Firewalls -- 11.2 Firewall Characteristics -- 11.3 Types of Firewalls -- 11.4 Firewall Basing -- 11.5 Firewall Location and Configurations -- 11.6 Recommended Reading and Web Site -- 11.7 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Some Aspects of Number Theory -- A.1 Prime and Relatively Prime Numbers -- A.2 Modular Arithmetic -- Appendix B: Projects for Teaching Network Security -- B.1 Research Projects.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note B.2 Hacking Project -- B.3 Programming Projects -- B.4 Laboratory Exercises -- B.5 Practical Security Assessments -- B.6 Writing Assignments -- B.7 Reading/Report Assignments -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- ONLINE CHAPTERS -- Chapter 12 Network Management Security -- 12.1 Basic Concepts of SNMP -- 12.2 SNMPv1 Community Facility -- 12.3 SNMPv3 -- 12.4 Recommended Reading and Web Sites -- 12.5 Key Terms, Review Questions, and Problems -- Chapter 13 Legal and Ethical Aspects -- 13.1 Cybercrime and Computer Crime -- 13.2 Intellectual Property -- 13.3 Privacy -- 13.4 Ethical Issues -- 13.5 Recommended Reading and Web Sites -- 13.6 Key Terms, Review Questions, and Problems -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Z -- References.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Stallings, William
Title Network Security Essentials: Applications and Standards
Place, publisher, and date of publication : Pearson India,c2010
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127073">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127073</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     CENTRAL LIBRARY Digital Library Digital Library 07/01/2019   005.8 STA-N4 E0141 07/01/2019 07/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery