skip to main content
Skip header Section
Network Security Essentials: Applications and StandardsNovember 2002
Publisher:
  • Prentice Hall Professional Technical Reference
ISBN:978-0-13-035128-9
Published:01 November 2002
Pages:
400
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Book: PREFACE: Preface In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. Objectives It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed. Intended Audience The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study. Plan of the Book The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i reportunderlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, SMIME, IP Secu- rity, SSLTLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh Internet Services for Instructors and Students There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the books Internet mailing list. The Web page is at ...

Cited By

  1. Chen W, Sharieh S and Blainey B A security-as-a-service solution for applications in cloud computing environment Proceedings of the Communications and Networking Symposium, (1-9)
  2. Wali H and Iyer N (2016). Modified MASK Algorithm for Image Encryption, Procedia Computer Science, 78:C, (603-609), Online publication date: 1-Mar-2016.
  3. ACM
    Chavhan N and Chhabria S Multiple design patterns for voice over IP security Proceedings of the International Conference on Advances in Computing, Communication and Control, (530-534)
  4. Barka E and Lakas A (2008). Integrating usage control with SIP-based communications, Journal of Computer Systems, Networks, and Communications, 2008, (1-8), Online publication date: 1-Jan-2008.
  5. Zhou Z Security enhancement over ad-hoc AODV routing protocol Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security, (116-121)
  6. ACM
    O'Leary M (2006). A laboratory based capstone course in computer security for undergraduates, ACM SIGCSE Bulletin, 38:1, (2-6), Online publication date: 31-Mar-2006.
  7. ACM
    O'Leary M A laboratory based capstone course in computer security for undergraduates Proceedings of the 37th SIGCSE technical symposium on Computer science education, (2-6)
  8. Tian J, Peng M and Liu Y A new active DDoS defense system based on automatic learning Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web, (249-250)
  9. McNair J, Tugcu T, Wang W and Xie J (2005). A survey of cross-layer performance enhancements for Mobile IP networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 49:2, (119-146), Online publication date: 5-Oct-2005.
  10. Lo J and Bishop J Component-based interchangeable cryptographic architecture for securing wireless connectivity in JavaTM applications Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (301-307)
  11. Kemmerer R and Vigna G Internet security and intrusion detection Proceedings of the 25th International Conference on Software Engineering, (748-749)
Contributors
  • The U.S. Military Academy at West Point

Recommendations