Network Security Essentials: Applications and StandardsThis book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists. |
Contents
STALMC02_0132380331pdf | 26 |
STALMC03_0132380331pdf | 59 |
STALMC04_0132380331pdf | 92 |
Copyright | |
13 other sections not shown
Other editions - View all
Network Security Essentials: Applications and Standards, 4/e William Stallings No preview available - 2003 |
Common terms and phrases
3DES access control agent algorithm applications bastion host bits block cipher bytes certificate ciphertext client compression confidentiality cryptographic decryption defined destination Diffie-Hellman digital signature e-mail encoding encryption algorithm entity example field Figure firewall gateway hash code hash function HMAC host ï ï ï identifier implementation includes input integrity Internet intrusion detection IP header IP packet IPSec IPv6 ISAKMP Kerberos key exchange length merchant message authentication message digest network management network security nonce octets operation optional parameters password payload plaintext private key protocol provides proxy public key public-key encryption request response router S/MIME scheme secret key sender server session key SNMP SNMP engine SNMPv3 specific standard stream cipher symmetric encryption techniques ticket tion traffic trusted user’s verify virus viruses worm