Network security essentials fourth edition




















View larger. For computer science, computer engineering, and electrical engineering majors taking a one-semester undergraduate courses on network security. A practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography.

Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell SSH and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. Download Preface. This material is protected under all copyright laws, as they currently exist.

No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. Comprehensive up-to-date survey of cryptography, authentication, and digital signatures.

Gives the students a solid yet concise overview of the fundamental algorithms and techniques underlying network security. Integrated, comprehensive, up-to-date coverage of Internet-based security tools and applications. This is the only book that provides this coverage. Unified, comprehensive treatment of mutual trust topics. Key management and user authentication are fundamental to the successful use of cryptographic services.

This treatment gives the student a systematic and comprehensive understanding of the issues involved. See Chapter Four. Excellent collection of homework problems. Approximately problems reinforce material in the text and also introduce new concepts and techniques. Problems are included at the end of each chapter. Comprehensive, up-to-date coverage of IP Security.

IPSec is one of the most complex, and one of the most important, new network security standards. This book gives a clear and detailed technical treatment of the topic. Chapter 8 is devoted to IPSec. Comprehensive, up-to-date coverage of wireless network Security.

The student gains an understanding of the importance of this topic. Chapter 6 is devoted to this topic. These are the two most important approaches to email security.

The book gives the student an understanding of both schemes at a detailed, technical level. Unequalled support for projects. For many instructors, an important component of a course is a project or set of projects that offers students hands-on experience to help reinforce concepts from the text. This book provides unparalleled support in that area.

The Instructor's Manual includes guidance on how to assign and structure the projects, and includes a set of suggested projects that covers a broad range of topics from the text. The following types of projects are supported in the Instructor's Projects Manual:. Comprehensive and unified discussion of intruders and viruses. The threats of intruders hackers and viruses are distinct, but there are also similarities. By treating the two in successive chapters and in a unified way, the student gains a greater understanding of both topics.

Treatment of firewalls. Firewalls are an integral part of any network security capability. See Chapter For username and password information, please contact your Pearson Representative. Access to the Companion Website and access to the online premium content is located at www. Students must use the access card located in the front of the book to register and access the online material. If there is no access card in the front of this textbook, students can purchase access by going to www.

Chapter 2 Symmetric Encryption and Message Confidentiality. Chapter 4 Key Distribution and User Authentication. Chapter 6 Wireless Network Security.

Appendix 7A: Radix Conversion. Pearson offers affordable and accessible purchase options to meet the needs of your students. Connect with us to learn more. William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture.

He has authored 18 titles, and counting revised editions, a total of 35 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.

He has received the prize for best Computer Science and Engineering textbook of the year from the Textbook and Academic Authors Association six times. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors.

The book also serves as a basic reference volume and is suitable for self-study. The book is organized in three parts: Part One. Cryptography: A concise survey of the cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, digital signatures, and key exchange.

Part Two. Network Security Applications: Covers important network security tools and applications, including Kerberos, X. Part Three. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses and the use of firewalls and trusted systems.

In addition, this book includes an extensive glossary, a list of frequently used acronyms, and a bibliography. Each chapter includes homework problems, review questions, a list of key words, suggestions for further reading, and recommended Web sites.

In addition, a test bank is available to instructors. For this new edition, a tremendous amount of original supporting material has been made available online in the following categories.

This includes a chapter on SNMP security and one on legal and ethical issues. Seven online appendices cover these topics for the interested student.



0コメント

  • 1000 / 1000