skip to main content
Skip header Section
Network Security Essentials: Applications and StandardsNovember 1999
Publisher:
  • Prentice Hall PTR
  • Upper Saddle River, NJ
  • United States
ISBN:978-0-13-016093-5
Published:01 November 1999
Pages:
366
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher: As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking. Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security. Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features: Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET Chapters on Web security and network management security (SNMPv3) Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.

Cited By

  1. Yadav R, Likhar P and Rao M SecWEM Proceedings of the 7th international conference on Information Systems Security, (309-321)
  2. Bottaro A, Marino E, Milicchio F, Paoluzzi A, Rosina M and Spini F Visual programming of location-based services Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I, (3-12)
  3. Chen W and Wang M (2009). A fuzzy c-means clustering-based fragile watermarking scheme for image authentication, Expert Systems with Applications: An International Journal, 36:2, (1300-1307), Online publication date: 1-Mar-2009.
  4. ACM
    Becker A, Arnab A and Serra M Assessing privacy criteria for drm using eu privacy legislation Proceedings of the 8th ACM workshop on Digital rights management, (77-86)
  5. Carminati B and Ferrari E Privacy-Aware Collaborative Access Control in Web-Based Social Networks Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, (81-96)
  6. ACM
    Arnab A and Hutchison A Verifiable digital object identity system Proceedings of the ACM workshop on Digital rights management, (19-26)
  7. Kim D, Jung Y and Chung T (2005). PRISM, The Journal of Supercomputing, 33:1, (103-121), Online publication date: 1-Jul-2005.
  8. ACM
    Yin H, Lin C, Sebastien B and Chu X A novel secure wireless video surveillance system based on Intel IXP425 network processor Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, (62-69)
  9. Ali G, Rafiq A and Shaikh Z Distributed agent architecture for packet filtering & monitoring in networked computers Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science, (1-6)
  10. ACM
    Arnab A and Hutchison A Fairer usage contracts for DRM Proceedings of the 5th ACM workshop on Digital rights management, (1-7)
  11. Lin P, Hsieh C and Huang P (2005). A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, 38:12, (2519-2529), Online publication date: 1-Dec-2005.
  12. Bamasak O, Zhang N and Edwards D DiSigncryption Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
  13. Liang W and Wang W (2005). On performance analysis of challenge/response based authentication in wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:2, (267-288), Online publication date: 1-Jun-2005.
  14. Chalmers R and Almeroth K (2019). A Security Architecture for Mobility-Related Services, Wireless Personal Communications: An International Journal, 29:3-4, (247-261), Online publication date: 1-Jun-2004.
  15. Bertino E, Carminati B, Ferrari E, Thuraisingham B and Gupta A (2004). Selective and Authentic Third-Party Distribution of XML Documents, IEEE Transactions on Knowledge and Data Engineering, 16:10, (1263-1278), Online publication date: 1-Oct-2004.
  16. ACM
    Vaughn R, Dampier D and Warkentin M Building an information security education program Proceedings of the 1st annual conference on Information security curriculum development, (41-45)
  17. Lee J Client authentication model using duplicated authentication server systems Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (655-662)
  18. Lee J Security agent model using interactive authentication database Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (627-634)
  19. Ferrari E Web data protection Proceedings of the 2004 international conference on Current Trends in Database Technology, (526-535)
  20. Lee J and Baik D Improved client authentication using session authentication in the internet Proceedings of the 2nd international conference on Human.society@internet, (650-655)
  21. Zachary J and Brooks R (2003). Bidirectional mobile code trust management using tamper resistant hardware, Mobile Networks and Applications, 8:2, (137-143), Online publication date: 1-Apr-2003.
  22. Lory P A process-oriented model for authentication on the basis of a coloured Petri net Proceedings of the 2003 international conference on Business process management, (232-245)
  23. Chinburg S, Sharda R and Weiser M Establishing the business value of network security using analytical hierarchy process Creating business value with information technology, (203-219)
  24. ACM
    Dunning L and Ramakrishnan S Security status display and browser interframe communication Proceedings of the 2002 ACM symposium on Applied computing, (237-241)
  25. Bolchini C and Schreiber F (2002). Smart card embedded information systems, Data & Knowledge Engineering, 41:2-3, (159-182), Online publication date: 1-Jun-2002.
  26. ACM
    Bertino E and Ferrari E (2002). Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security (TISSEC), 5:3, (290-331), Online publication date: 1-Aug-2002.
  27. Siau K and Meakim S Managing e-business Managing web usage in the workplace, (254-269)
  28. Bertino E, Castano S and Ferrari E (2018). Securing XML Documents with Author-X, IEEE Internet Computing, 5:3, (21-31), Online publication date: 1-May-2001.
  29. ACM
    Bertino E, Castano S and Ferrari E On specifying security policies for web documents with an XML-based language Proceedings of the sixth ACM symposium on Access control models and technologies, (57-65)
Contributors
  • The U.S. Military Academy at West Point

Recommendations