Network Security Essentials: Applications and StandardsThis book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists. |
O que estão dizendo - Escrever uma resenha
Não encontramos nenhuma resenha nos lugares comuns.
Conteúdo
PART ONE CRYPTOGRAPHY | 26 |
PublicKey Cryptography and Message Authentication | 59 |
PART TWO NETWORK SECURITY APPLICATIONS | 92 |
Direitos autorais | |
11 outras seções não mostradas
Outras edições - Visualizar todos
Network Security Essentials: Applications and Standards William Stallings Visualização de trechos - 2007 |
Network Security Essentials: Applications and Standards William Stallings Não há visualização disponível - 2006 |
Network security essentials: applications and standards William Stallings Não há visualização disponível - 2007 |
Termos e frases comuns
access control agent algorithm application attack audit bits block cipher bytes certificate ciphertext client compression cryptographic decryption defined destination Diffie-Hellman digital signature e-mail encoded encryption algorithm entity example field Figure firewall gateway hash code hash function HMAC host identifier implementation includes input integer Internet intrusion detection IP header IP packet IPSec IPv6 ISAKMP Kerberos key exchange length merchant message authentication message authentication code message digest network management network security octets operation option parameters password payload plaintext private key protocol provides proxy public key public-key encryption replay request response router S/MIME scheme secret key sender server session key SNMP SNMP engine SNMPv3 specific standard stream cipher symmetric encryption techniques ticket tion traffic transmitted trusted user’s verify virus viruses worm
Referências a este livro
Intrusion Detection and Correlation: Challenges and Solutions Christopher Kruegel,Fredrik Valeur,Giovanni Vigna Visualização parcial - 2004 |
Cyber-Crime: The Challenge in Asia Rod Broadhurst,Peter Grabosky Não há visualização disponível - 2005 |