Network Security: Know It All

Network Security: Know It All
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 PDF
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 84,43 €

Jetzt 71,57 €* PDF

Artikel-Nr:
9780080560151
Veröffentl:
2008
Einband:
PDF
Seiten:
368
Autor:
James Joshi
eBook Typ:
PDF
eBook Format:
PDF
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.* Examples illustrate core security concepts for enhanced comprehension
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.* Examples illustrate core security concepts for enhanced comprehension
1;Front Cover;12;Network Security: Know It All;43;Copyright Page;54;Contents;65;About the Authors;106;CHAPTER 1 Network Security Overview;166.1;1.1 Cryptographic Tools;176.2;1.2 Key Predistribution;276.3;1.3 Authentication Protocols;326.4;1.4 Secure Systems;406.5;1.5 Firewalls;536.6;1.6 Conclusion;576.7;Further Reading;597;CHAPTER 2 Network Attacks;627.1;2.1 Introduction;627.2;2.2 Network Attacks and Security Issues;627.3;2.3 Protection and Prevention;697.4;2.4 Detection;767.5;2.5 Assessment and Response;777.6;2.6 Conclusion;787.7;References;788;CHAPTER 3 Security and Privacy Architecture;808.1;3.1 Objectives;808.2;3.2 Background;818.3;3.3 Developing a Security and Privacy Plan;828.4;3.4 Security and Privacy Administration;838.5;3.5 Security and Privacy Mechanisms;878.6;3.6 Architectural Considerations;958.7;3.7 Conclusion;1009;CHAPTER 4 Network Security Algorithms;1029.1;4.1 Searching for Multiple Strings in Packet Payloads;1049.2;4.2 Approximate String Matching;1089.3;4.3 IP Traceback via Probabilistic Marking;1109.4;4.4 IP Traceback via Logging;1149.5;4.5 Detecting Worms;1179.6;4.6 Conclusion;12010;CHAPTER 5 Concepts in IP Security;12210.1;5.1 The Need for Security;12310.2;5.2 Choosing Where to Apply Security;12510.3;5.3 Components of Security Models;12910.4;5.4 IPsec;13310.5;5.5 Transport-Layer Security;14010.6;5.6 Securing the Hypertext Transfer Protocol;14710.7;5.7 Hashing and Encryption: Algorithms and Keys;14810.8;5.8 Exchanging Keys;15510.9;Further Reading;16111;CHAPTER 6 IP Security in Practice;16411.1;6.1 IP Security Issues;16511.2;6.2 Security Goals;16711.3;6.3 Encryption and Authentication Algorithms;17011.4;6.4 IPsec: The Protocols;17511.5;6.5 IP and IPsec;17711.6;6.6 Implementing and Deploying IPsec;18711.7;6.7 Conclusion;18812;CHAPTER 7 Security in Wireless Systems;19012.1;7.1 Introduction;19012.2;7.2 Security and Privacy Needs of a Wireless System;19212.3;7.3 Required Features for a Secured Wireless Communications System;20012.4;7.4 Methods of Providing Privacy and Security in Wireless Systems;20012.5;7.5 Wireless Security and Standards;20212.6;7.6 IEEE 802.11 Security;20212.7;7.7 Security in North American Cellular/PCS Systems;20412.8;7.8 Security in GSM, GPRS, and UMTS;20812.9;7.9 Data Security;21312.10;7.10 Air Interface Support for Authentication Methods;22112.11;7.11 Summary of Security in Current Wireless Systems;22212.12;7.12 Conclusion;22512.13;References;22513;CHAPTER 8 Mobile Security and Privacy;22613.1;8.1 Security Primer;22713.2;8.2 Cellular Network Security;24613.3;8.3 Wireless LAN Security;25213.4;8.4 Bluetooth Security;26013.5;8.5 Ad Hoc Network Security;26313.6;8.6 Mobile Privacy;26813.7;8.7 Conclusion;27313.8;Further Reading;27413.9;References;27514;CHAPTER 9 Optical Network Survivability;27814.1;9.1 Basic Concepts;28014.2;9.2 Protection in SONET/SDH;28414.3;9.3 Protection in IP Networks;29714.4;9.4 Why Optical Layer Protection;29814.5;9.5 Optical Layer Protection Schemes;30614.6;9.6 Interworking between Layers;31914.7;9.7 Conclusion;32014.8;Further Reading;32114.9;References;32115;CHAPTER 10 Intrusion Response Systems: A Survey;32415.1;10.1 Introduction;32415.2;10.2 Static Decision-Making Systems;32715.3;10.3 Dynamic Decision-Making Systems;33215.4;10.4 Intrusion Tolerance through Diverse Replicas;34215.5;10.5 Responses to Specific Kinds of Attacks;34615.6;10.6 Benchmarking Intrusion Response Systems;35015.7;10.7 Thoughts on Evolution of IRS Technology;35315.8;10.8 Conclusion;35415.9;References;35516;Index;35816.1;A;35816.2;B;35816.3;C;35816.4;D;35916.5;E;35916.6;F;35916.7;G;35916.8;H;35916.9;I;36016.10;K;36116.11;L;36116.12;M;36116.13;N;36116.14;O;36116.15;P;36216.16;R;36216.17;S;36216.18;T;36316.19;U;36416.20;V;36416.21;W;364

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.