Home > Store

Network Security Essentials Applications and Standards, 5th Edition

Register your product to gain access to bonus material or receive a coupon.

Network Security Essentials Applications and Standards, 5th Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Comprehensive up-to-date survey of cryptography, authentication, and digital signatures.
    Gives the students a solid yet concise overview of the fundamental algorithms and techniques underlying network security.
  • Integrated, comprehensive, up-to-date coverage of Internet-based security tools and applications.
    This is the only book that provides this coverage.
  • Unified, comprehensive treatment of mutual trust topics.
    Key management and user authentication are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
  • Excellent collection of homework problems.
    Approximately 150 problems reinforce material in the text and also introduce new concepts and techniques. Problems are included at the end of each chapter.
  • Comprehensive, up-to-date coverage of IP Security.
    IPSec is one of the most complex, and one of the most important, new network security standards. This book gives a clear and detailed technical treatment of the topic.
  • Comprehensive, up-to-date coverage of wireless network Security.
    The student gains an understanding of the importance of this topic. C
  • Coverage of both PGP and S/MIME for electronic mail security.
    These are the two most important approaches to email security. The book gives the student an understanding of both schemes at a detailed, technical level.
  • Comprehensive and unified discussion of intruders and viruses.
    The threats of intruders (hackers) and viruses are distinct, but there are also similarities. By treating the two in successive chapters and in a unified way, the student gains a greater understanding of both topics.
  • Treatment of firewalls.
    Firewalls are an integral part of any network security capability.
  • Unequaled support for instructors and students
    • The book includes 150 homework problems with a range of difficulty plus numerous review questions; the Instructor's Solutions Manual contains solutions to all problems and questions.

    • A Computerized Test Generator is provided.

    • The book makes liberal use of figures and tables to clarify concepts.

    • A list of key words, a recommended reading list, and recommended Web sites appear at the end of each chapter.

    • A Glossary, a list of acronyms, and an up-to-date bibliography appear at the end of the book.
    • An Internet mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and the author. Sign-up information for the mailing list is provided at the Companion Website.
    • The Author Web site includes an additional set of homework problems, with solutions, that the student can access for self-study to help reinforce concepts.

SUPPLEMENTS

Instructor Resources

The following protected instructor material is available on the Publisher’s Web site at www.pearsonhighered.com/stallings. For username and password information, please contact your Pearson Representative.

  • TestBank: A chapter-by-chapter set of question that can be used by the instructor for quizzes or made available to the student for self-study.
  • PowerPoint Lecture Slides: A set of slides covering all chapters, suitable for use in lecturing.
  • Instructor Solutions Manual: Solutions to end-of-chapter Review Questions and Problems.
  • Instructor Projects Manual: Suggested project assignments for all of the project categories listed below.
  • Figures and Tables
  • Sample Research Projects
  • Sample Reading and Report Assignments
  • Programming Projects
  • Textbook Errata
  • Link to online premium content
    • Online Appendices
    • Supporting Documents
Projects
For many instructors, an important component of a course is a project or set of projects by which the student gets hands-on experience to reinforce concepts from the text. This book provides unparalleled support in that area. The IRC not only includes guidance on how to assign and structure the projects, but also includes a set of suggested projects that covers a broad range of topics from the text:
  • Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report.
  • Hacking Project: This exercise is designed to illuminate the key issues in intrusion detection and prevention.
  • Programming Projects: A broad range of topics that can be implemented in any suitable language on any platform.
  • Lab Exercises: A series of projects that involve programming and experimenting with concepts from the book.
  • Practical Security Assessments: A set of exercises to examine current infrastructure and practices of an existing organization.
  • Writing Assignments: A set of suggested writing assignments, by chapter, designed to engage the student in a deep understanding of the topic and to reinforce their knowledge of hard facts and problem-solving techniques.
  • Reading/Report Assignments: A list of papers in the literature that can be assigned for the student to read and then write a short report.

Student Resources

Access to the Companion Website and access to the online premium content is located at www.pearsonhighered.com/stallings. Students must use the access card located in the front of the book to register and access the online premium content. If there is no access card, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.” Instructors must register on the site to access the material. The following content is available through the Companion Web site:

  • Textbook Errata
  • Chapter-by-Chapter Links
Online Premium Content includes:
  • Online chapters: To limit the size and cost of the book, three chapters of the book are provided in PDF format. This includes a chapter on SHA-3, a chapter on SNMP security, and one on legal and ethical issues.
  • Online appendices: There are numerous interesting topics that support material found in the text but whose inclusion is not warranted in the printed text. A number of online appendices cover these topics for the interested student.
  • Homework problems and solutions: To aid the student in understanding the material, a separate set of homework problems with solutions are available. These enable the students to test their understanding of the text.
  • Key papers: A number of papers from the professional literature, many hard to find, are provided for further reading.
  • Supporting documents: A variety of other useful documents are referenced in the text and provided online.

Author Web Site - Resources for Students and Instructors http://www.williamstallings.com/NetSec/

  • This site provides support for both students and instructors. The site includes links to other relevant sites, transparency masters of figures and tables in the book in PDF (Adobe Acrobat) format, and PowerPoint Lecture Slides. New to this edition is a set of homework problems with solutions available on the Web site. Students can enhance their understanding of the material by working out the solutions to these problems and then checking their answers.
  • An Internet mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author.
  • The Computer Science Student Resource site, at WilliamStallings.com/StudentSupport.html, provides documents, information, and useful links for computer science students and professionals.
  • Links to important sites, organized according to the chapters of the book, so that the student can visit sites related to the material currently being studied to get up-to-date and supplementary information.
  • Links to course pages by professors teaching from the book. This can give other instructors useful ideas.
  • An errata sheet for the book is updated monthly as needed.
  • Transparency masters of figures from the book in PDF (Adobe Acrobat) format.
  • A set of PowerPoint Lecture Slides for use in lecturing.
  • A set of practice homework problems, with solutions.

Description

  • Copyright 2014
  • Edition: 5th
  • Book
  • ISBN-10: 0-13-337043-7
  • ISBN-13: 978-0-13-337043-0

Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist).

A practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. 

Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.

Sample Content

Table of Contents

Online Resources
Preface
About the Author Chapter 1       Introduction

         1.1         Computer Security Concepts

         1.2         The OSI Security Architecture

         1.3         Security Attacks

         1.4         Security Services

         1.5         Security Mechanisms

         1.6         A Model for Network Security

         1.7         Standards

         1.8         Outline of This Book

         1.9         Recommended Reading

         1.10         Internet and Web Resources

         1.11         Key Terms, Review Questions, and Problems

PART ONE  CRYPTOGRAPHY
Chapter 2       Symmetric Encryption and Message Confidentiality

         2.1         Symmetric Encryption Principles

         2.2         Symmetric Block Encryption Algorithms

         2.3         Random and Pseudorandom Numbers

         2.4         Stream Ciphers and RC4

         2.5         Cipher Block Modes of Operation

         2.6         Recommended Reading

         2.7         Key Terms, Review Questions, and Problems

Chapter 3       Public-Key Cryptography and Message Authentication

         3.1         Approaches to Message Authentication

         3.2         Secure Hash Functions

         3.3         Message Authentication Codes

         3.4         Public Key Cryptography Principles

         3.5         Public-Key Cryptography Algorithms

         3.6         Digital Signatures

         3.7         Recommended Reading

         3.8         Key Terms, Review Questions, and Problems

PART TWO  NETWORK SECURITY APPLICATIONS
Chapter 4       Key Distribution and User Authentication

         4.1         Symmetric Key Distribution Using Symmetric Encryption

         4.2         Kerberos

         4.3         Key Distribution Using Asymmetric Encryption

         4.4         X.509 Certificates

         4.5         Public Key Infrastructure

         4.6         Federated Identity Management

         4.7         Recommended Reading

         4.8         Key Terms, Review Questions, and Problems

Chapter 5       Network Access Control and Cloud Security

         5.1         Network Access Control

         5.2         Extensible Authentication Protocol

         5.3         IEEE 802.1X Port-Based Network Access Control

         5.4         Cloud Computing

         5.5         Cloud Security Risks and Countermeasures

         5.6         Data Protection in the Cloud

         5.7         Cloud Security as a Service

         5.8         Recommended Reading

         5.9         Key Terms, Review Questions, and Problems

Chapter 6       Transport-Level Security

         6.1         Web Security Issues

         6.2         Secure Sockets Layer (SSL)

         6.3         Transport Layer Security (TLS)

         6.4         HTTPS

         6.5         Secure Shell (SSH)

         6.6         Recommended Reading

         6.7         Key Terms, Review Questions, and Problems

Chapter 7       Wireless Network Security

         7.1         Wireless Security

         7.2         Mobile Device Security

         7.3         IEEE 802.11 Wireless LAN Overview

         7.4         IEEE 802.11i Wireless LAN Security

         7.5         Recommended Reading

         7.6          Key Terms, Review Questions, and Problems

Chapter 8       Electronic Mail Security

         8.1         Pretty Good Privacy (PGP)

         8.2         S/MIME

         8.3         DomainKeys Identified Mail (DKIM)

         8.4         Recommended Web Sites

         8.5         Key Terms, Review Questions, and Problems

Chapter 9       IP Security

         9.1         IP Security Overview

         9.2         IP Security Policy

         9.3         Encapsulating Security Payload

         9.4         Combining Security Associations

         9.5         Internet Key Exchange

         9.6         Cryptographic Suites

         9.7         Recommended Reading

         9.8          Key Terms, Review Questions, and Problems

PART THREE  SYSTEM SECURITY
Chapter 10       Malicious Software

         10.1         Types of Malicious Software

         10.2         Propagation – Infected Content - Viruses

         10.3         Propagation – Vulnerability Exploit - Worms

         10.4         Propagation – Social Engineering – SPAM, Trojans

         10.5         Payload – System Corruption

         10.6         Payload – Attack Agent – Zombie, Bots

         10.7         Payload – Information Theft – Keyloggers, Phishing, Spyware

         10.8         Payload – Stealthing – Backdoors, Rootkits

         10.9         Countermeasures

         10.10         Distributed Denial of Service Attacks

         10.11         Recommended Reading

         10.12         Key Terms, Review Questions, and Problems

Chapter 11       Intruders

         11.1         Intruders

         11.2         Intrusion Detection

         11.3         Password Management

         11.4         Recommended Reading

         11.5         Key Terms, Review Questions, and Problems

Chapter 12       Firewalls

         12.1         The Need for Firewalls

         12.2         Firewall Characteristics

         12.3         Types of Firewalls

         12.4         Firewall Basing

         12.5         Firewall Location and Configurations

         12.6         Recommended Reading

         12.7         Key Terms, Review Questions, and Problems

APPENDICES
Appendix A              Some Aspects of Number Theory

         A.1         Prime and Relatively Prime Numbers

         A.2         Modular Arithmetic

Appendix B              Projects for Teaching Network Security

         B.1         Research Projects

         B.2         Hacking Project

         B.3         Programming Projects

         B.4         Laboratory Exercises

         B.5         Practical Security Assessments

         B.6         Writing Assignments

         B.7         Reading/Report Assignments

REFERENCES
INDEX

ONLINE CHAPTERS AND APPENDICES -
Online chapters, appendices, and other documents are Premium Content. Students must use the access card located in the front of the book to register and access the online premium content. If there is no access card, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.” Instructors must register on the site to access the material.
Chapter 13       Network Management Security

         13.1         Basic Concepts of SNMP

         13.2         SNMPv1 Community Facility

         13.3         SNMPv3

         13.4         Recommended Reading

         13.5         Key Terms, Review Questions, and Problems

Chapter 14       Legal and Ethical Issues

         14.1         Cybercrime and Computer Crime

         14.2         Intellectual Property

         14.3         Privacy

         14.4         Ethical Issues

         14.5         Recommended Reading

         14.6         Key Terms, Review Questions, and Problems

Chapter 15       SHA-3

         15.1         Evaluation Criteria for SHA-3

         15.2         The SHA-3 Algorithm

         15.3         Recommended Reading

         15.4         Key Terms and Review Questions

Appendix C   Standards and Standards-Setting Organizations

         C.1         The Importance of Standards

         C.2         Internet Standards and the Internet Society

         C.3         National Institute of Standards and Technology

Appendix D              TCP/IP and OSI

         D.1         Protocols and Protocol Architectures

         D.2         The TCP/IP Protocol Architecture

         D.3         The Role of an Internet Protocol

         D.4         IPv4

         D.5         IPv6

         D.6         The OSI Protocol Architecture

Appendix E       Pseudorandom Number Generation

         E.1         PRNG Requirements

         E.2         PRNG Using a Block Cipher

         E.3         PRNG Using a Hash Function or Message Authentication Code

Appendix F       Kerberos Encryption Techniques

         F.1         Password-to-Key  Transformation

         F.2         Propagating Cipher Block Chaining Mode

Appendix G       Data Compression Using ZIP

         G.1         Compression Algorithm

         G.2         Decompression Algorithm

Appendix H       More on PGP

         H.1         True Random Numbers

         H.2         Pseudorandom Numbers

         H.3         Cryptographic Keys and Key Rings

         H.4         Public-Key Management

Appendix I       The International Reference Alphabet
Appendix J       The Base-Rate Fallacy
Appendix K       Radix-64 Conversion
GLOSSARY
LIST OF ACRONYMS

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020