Network Security Essentials: Applications and StandardsThis book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists. |
Contents
Introduction | 2 |
PART ONE CRYPTOGRAPHY | 26 |
PublicKey Cryptography and Message Authentication | 59 |
Copyright | |
12 other sections not shown
Other editions - View all
Network Security Essentials: Applications and Standards, 4/e William Stallings No preview available - 2003 |
Common terms and phrases
access control addition agent algorithm allow applications approach attack authentication authorized bits block bytes certificate Chapter characters cipher ciphertext client compression connection consists contains cryptographic decryption defined designed destination detection distributed encryption engine entity example exchange field Figure firewall format hash function header host identifier implementation includes indicates initial input integrity Internet intrusion IPSec issued Kerberos known length merchant mode object operation optional packet parameters password payload performs plaintext possible prevent private key problem produce protection protocol provides public key received referred request response result router scheme sequence server session key signature signed SNMP specific standard Table techniques ticket tion traffic trusted verify virus