Network Security Essentials: Applications and StandardsAs we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking. Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security. Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features. Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET. Chapters on Web security and network management security (SNMPv3). Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. On-line transparency masters, an Internet mailing list, and links to relevant Web sites are available at |
From inside the book
Results 1-3 of 93
Applications and Standards William Stallings. SNMP entity Command generator applications Notification Notification originator applications ... Application initiates asynchronous messages ; in the case of a traditional manager , the In- ...
... Application requests that a PDU be sent , and subsequently how the matching response is returned to that application ; these events occur at a manager . Figure 8.8b shows the corresponding events at an agent . The figure shows how an ...
Applications and Standards William Stallings. The Dispatcher delivers each incoming request PDU to the correct command responder application , using the processPdu primitive . The command responder then performs the following steps ...
Contents
Introduction | 1 |
PART ONE CRYPTOGRAPHY | 19 |
PublicKey Cryptography and Message | 47 |
Copyright | |
10 other sections not shown