Home > Store > Security > Network Security

Network Security Essentials: Applications and Standards, 4th Edition

Register your product to gain access to bonus material or receive a coupon.

Network Security Essentials: Applications and Standards, 4th Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

Comprehensive up-to-date survey of cryptography, authentication, and digital signatures.
Gives the students a solid yet concise overview of the fundamental algorithms and techniques underlying network security.

Integrated, comprehensive, up-to-date coverage of Internet-based security tools and applications.
This is the only book that provides this coverage.

Unified, comprehensive treatment of mutual trust topics.
Key management and user authentication are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved. See Chapter Four.

Excellent collection of homework problems.
Approximately 150 problems reinforce material in the text and also introduce new concepts and techniques. Problems are included at the end of each chapter.

Comprehensive, up-to-date coverage of IP Security.
IPSec is one of the most complex, and one of the most important, new network security standards. This book gives a clear and detailed technical treatment of the topic. Chapter 8 is devoted to IPSec.

Comprehensive, up-to-date coverage of wireless network Security.
The student gains an understanding of the importance of this topic. Chapter 6 is devoted to this topic.

Coverage of both PGP and S/MIME for electronic mail security.
These are the two most important approaches to email security. The book gives the student an understanding of both schemes at a detailed, technical level. Chapter 7 is devoted to PGP and S/MIME.

Unequalled support for projects.
For many instructors, an important component of a course is a project or set of projects that offers students hands-on experience to help reinforce concepts from the text. This book provides unparalleled support in that area. The Instructor's Manual includes guidance on how to assign and structure the projects, and includes a set of suggested projects that covers a broad range of topics from the text. The following types of projects are supported in the Instructor's Projects Manual:

  • Hacking Assignments: A series of hacking problems allows the student to experiment.
  • Block Cipher Projects: These give the student a greater understanding of AES, DES, and modes of operation.
  • Programming Projects: The Instructor's Manual includes a series of small programming projects that cover a broad range of topics, and that can be implemented in any suitable language on any platform.
  • Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report.
  • Practical Security Assessments: A set of exercises to examine current infrastructure and practices of an existing organization.
  • Reading/Report Assignments: A list of papers in the literature that can be assigned for the student to read and then write a short report.
  • Writing Assignments: Designed to engage the student in a deep understanding of the topic and to reinforce their knowledge of hard facts and problem-solving techniques.

Comprehensive and unified discussion of intruders and viruses.
The threats of intruders (hackers) and viruses are distinct, but there are also similarities. By treating the two in successive chapters and in a unified way, the student gains a greater understanding of both topics. See Chapters 9 & 10.

Treatment of firewalls.
Firewalls are an integral part of any network security capability. See Chapter 11.

Unequalled support for instructors and students

  • The book includes 150 homework problems with a range of difficulty plus numerous review questions; the Instructor's Solutions Manual contains solutions to all problems and questions.
  • A Computerized Test Generator is provided.
  • The book makes liberal use of figures and tables to clarify concepts.
  • A list of key words, a recommended reading list, and recommended Web sites appear at the end of each chapter.
  • A Glossary, a list of acronyms, and an up-to-date bibliography appear at the end of the book.
  • An Internet mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and the author. Sign-up information for the mailing list is provided at the Companion Website.
  • The Author Web site includes an additional set of homework problems, with solutions, that the student can access for self-study to help reinforce concepts.

SUPPLEMENTS

Instructor Resources

The following protected instructor material is available on the Publisher’s Web site at www.pearsonhighered.com/stallings. For username and password information, please contact your Pearson Representative.

  • TestBank: A chapter-by-chapter set of question that can be used by the instructor for quizzes or made available to the student for self-study.
  • PowerPoint Lecture Slides: A set of slides covering all chapters, suitable for use in lecturing.
  • Instructor Solutions Manual: Solutions to end-of-chapter Review Questions and Problems.
  • Instructor Projects Manual: Suggested project assignments for all of the project categories listed below.
  • Figures and Tables
  • Sample Research Projects
  • Sample Reading and Report Assignments
  • Programming Projects
  • Textbook Errata
  • Link to online premium content
    • Online Appendices
    • Supporting Documents

Student Resources

Access to the Companion Website and access to the online premium content is located at www.pearsonhighered.com/stallings. Students must use the access card located in the front of the book to register and access the online material. If there is no access card in the front of this textbook, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.” Instructors must register on the site to access the material.

The following content is available through the Companion Web site:

  • Online Appendices
  • Textbook Errata
  • Chapter-by-Chapter Links

 What’s New on the Author Web Site http://www.williamstallings.com/NetSec/NetSec4e.html

  • This site provides support for both students and instructors. The site includes links to other relevant sites, transparency masters of figures and tables in the book in PDF (Adobe Acrobat) format, and PowerPoint Lecture Slides. New to this edition is a set of homework problems with solutions available on the Web site. Students can enhance their understanding of the material by working out the solutions to these problems and then checking their answers.
  • An Internet mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author.
  • The Computer Science Student Resource site, at WilliamStallings.com/StudentSupport.html, provides documents, information, and useful links for computer science students and professionals.
  • Links to important sites, organized according to the chapters of the book, so that the student can visit sites related to the material currently being studied to get up-to-date and supplementary information.
  • Links to course pages by professors teaching from the book. This can give other instructors useful ideas.
  • An errata sheet for the book is updated monthly as needed.
  • Transparency masters of figures from the book in PDF (Adobe Acrobat) format.
  • A set of PowerPoint Lecture Slides for use in lecturing.
  • A set of practice homework problems, with solutions.
Projects
For many instructors, an important component of a course is a project or set of projects by which the student gets hands-on experience to reinforce concepts from the text. This book provides unparalleled support in that area. The IRC not only includes guidance on how to assign and structure the projects, but also includes a set of suggested projects that covers a broad range of topics from the text:

  • Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report.
  • Hacking Project: This exercise is designed to illuminate the key issues in intrusion detection and prevention.
  • Programming Projects: A broad range of topics that can be implemented in any suitable language on any platform.
  • Lab Exercises: A series of projects that involve programming and experimenting with concepts from the book.
  • Practical Security Assessments: A set of exercises to examine current infrastructure and practices of an existing organization.
  • Writing Assignments: A set of suggested writing assignments, by chapter, designed to engage the student in a deep understanding of the topic and to reinforce their knowledge of hard facts and problem-solving techniques.
  • Reading/Report Assignments: A list of papers in the literature that can be assigned for the student to read and then write a short report.

Description

  • Copyright 2011
  • Dimensions: 7" x 9-1/8"
  • Pages: 432
  • Edition: 4th
  • Book
  • ISBN-10: 0-13-610805-9
  • ISBN-13: 978-0-13-610805-4

Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

Highlights include: expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

Sample Content

Table of Contents

About the Author

Preface

Chapter 1        Introduction

            1.1       Computer Security Concepts

            1.2       The OSI Security Architecture

            1.3       Security Attacks

            1.4       Security Services

            1.5       Security Mechanisms

            1.6       A Model for Network Security

            1.7       Standards

            1.8       Outline of This Book

            1.9       Recommended Reading

            1.10     Internet and Web Resources

            1.11     Key Terms, Review Questions, and Problems

PART ONE  CRYPTOGRAPHY

Chapter 2        Symmetric Encryption and Message Confidentiality

            2.1       Symmetric Encryption Principles

            2.2       Symmetric Block Encryption Algorithms

            2.3       Random and Pseudorandom Numbers

            2.4       Stream Ciphers and RC4

            2.5       Cipher Block Modes of Operation

            2.6       Recommended Reading and Web Sites

            2.7       Key Terms, Review Questions, and Problems

Chapter 3        Public-Key Cryptography and Message Authentication

            3.1       Approaches to Message Authentication

            3.2       Secure Hash Functions

            3.3       Message Authentication Codes

            3.4       Public Key Cryptography Principles

            3.5       Public-Key Cryptography Algorithms

            3.6       Digital Signatures

            3.7       Recommended Reading and Web Sites

            3.8       Key Terms, Review Questions, and Problems

PART TWO  NETWORK SECURITY APPLICATIONS

Chapter 4        Key Distribution and User Authentication

            4.1       Symmetric Key Distribution Using Symmetric Encryption

            4.2       Kerberos

            4.3       Key Distribution Using Asymmetric Encryption

            4.4       X.509 Certificates

            4.5       Public Key Infrastructure

            4.6       Federated Identity Management

            4.7       Recommended Reading and Web Sites

            4.8       Key Terms, Review Questions, and Problems

Chapter 5        Transport-Level Security

            5.1       Web Security Issues

            5.2       Secure Sockets Layer (SSL)

            5.3       Transport Layer Security (TLS)

            5.4       HTTPS

            5.5       Secure Shell (SSH)

            5.6       Recommended Reading and Web Sites

            5.7       Key Terms, Review Questions, and Problems

Chapter 6        Wireless Network Security

            6.1       IEEE 802.11 Wireless LAN Overview

            6.2       IEEE 802.11i Wireless LAN Security

            6.3       Wireless Application Protocol Overview

            6.4       Wireless Transport Layer Security

            6.5       WAP End-to-End Security

            6.6       Recommended Reading and Web Sites

            6.7       Key Terms, Review Questions, and Problems

Chapter 7        Electronic Mail Security

            7.1       Pretty Good Privacy (PGP)

            7.2       S/MIME

            7.3       DomainKeys Identified Mail (DKIM)

            7.4       Recommended Web Sites

            7.5       Key Terms, Review Questions, and Problems

            Appendix 7A: Radix-64 Conversion

Chapter 8        IP Security

            8.1       IP Security Overview

            8.2       IP Security Policy

            8.3       Encapsulating Security Payload

            8.4       Combining Security Associations

            8.5       Internet Key Exchange

            8.6       Cryptographic Suites

            8.7       Recommended Reading and Web Sites

            8.8       Key Terms, Review Questions, and Problems

PART THREE  SYSTEM SECURITY

Chapter 9        Intruders

            9.1       Intruders

            9.2       Intrusion Detection

            9.3       Password Management

            9.4       Recommended Reading and Web Sites

            9.5       Key Terms, Review Questions, and Problems

            Appendix 9A  The Base-Rate Fallacy

Chapter 10      Malicious Software

            10.1     Types of Malicious Software

            10.2     Viruses

            10.3     Virus Countermeasures

            10.4     Worms

            10.5     Distributed Denial of Service Attacks

            10.6     Recommended Reading and Web Sites

            10.7     Key Terms, Review Questions, and Problems

Chapter 11      Firewalls

            11.1     The Need for Firewalls

            11.2     Firewall Characteristics

            11.3     Types of Firewalls

            11.4     Firewall Basing

            11.5     Firewall Location and Configurations

            11.6     Recommended Reading and Web Sites

            11.7     Key Terms, Review Questions, and Problems

APPENDICES

Appendix A    Some Aspects of Number Theory

            A.1       Prime and Relatively Prime Numbers

            A.2       Modular Arithmetic

Appendix B    Projects for Teaching Network Security

            B.1       Research Projects

            B.2       Hacking Project

            B.3       Programming Projects

            B.4       Laboratory Exercises

            B.5       Practical Security Assessments

            B.6       Writing Assignments

            B.7       Reading/Report Assignments

ONLINE CHAPTERS

Chapter 12      Network Management Security

            12.1     Basic Concepts of SNMP

            12.2     SNMPv1 Community Facility

            12.3     SNMPv3

            12.4     Recommended Reading and Web Sites

            12.5     Key Terms, Review Questions, and Problems

Chapter 13      Legal and Ethical Issues

            13.1     Cybercrime and Computer Crime

            13.2     Intellectual Property

            13.3     Privacy

            13.4     Ethical Issues

            13.5     Recommended Reading and Web Sites

            13.6     Key Terms, Review Questions, and Problems

ONLINE APPENDICES

Appendix C    Standards and Standards-Setting Organizations

            C.1       The Importance of Standards

            C.2       Internet Standards and the Internet Society

            C.3       National Institute of Standards and Technology

Appendix D    TCP/IP and OSI

            D.1       Protocols and Protocol Architectures

            D.2       The TCP/IP Protocol Architecture

            D.3       The Role of an Internet Protocol

            D.4       IPv4

            D.5       IPv6

            D.6       The OSI Protocol Architecture

Appendix E    Pseudorandom Number Generation

            E.1       PRNG Requirements

            E.2       PRNG Using a Block Cipher

            E.3       PRNG Using a Hash Function or Message Authentication Code

Appendix F    Kerberos Encryption Techniques

            F.1       Password-to-Key  Transformation

            F.2       Propagating Cipher Block Chaining Mode

Appendix G    Data Compression Using ZIP

Appendix H    PGP Random Number Generation

GLOSSARY

REFERENCES

INDEX

LIST OF ACRONYMS

Updates

Submit Errata

More Information

ONE MONTH ACCESS!

WITH PURCHASE


Get unlimited 30-day access to thousands of Books & Training Videos about technology, professional development and digital media If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months.