Network Security Essentials: Applications and Standards
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
85 pages matching example in this book
Results 1-3 of 85
What people are saying - Write a review
PART ONE CRYPTOGRAPHY
10 other sections not shown
3DES access control agent application attacks bits block cipher bytes certificate ciphertext client compression confidentiality conventional encryption cryptanalysis cryptographic decryption defined destination Diffie-Hellman digital signature encoding encryption algorithm entity example field Figure firewall gateway hash code hash function HMAC host identifier implementation includes input integrity Internet intrusion detection IP header IP packet IPSec IPv4 IPv6 ISAKMP Kerberos key distribution key exchange length link encryption merchant message authentication message digest network management network security nonce octets operation opponent option parameters password payload plaintext private key protection protocol provides proxy public key public-key encryption received replay request router S/MIME scheme secret key sender server session key SNMP SNMP engine SNMPv3 specific standard symmetric encryption ticket tion traffic transmitted trusted tunnel mode user's verify virus viruses