Format:
Online Ressource (1 v.)
Edition:
Online-Ausg.
ISBN:
9780123744630
,
0123744636
Content:
Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. & Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication & Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone & Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp
Content:
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension
Note:
Includes bibliographical references and index. - Description based on print version record
,
Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan
,
3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol
,
5.7 Hashing and Encryption: Algorithms and Keys5.8 Exchanging Keys; Further Reading; CHAPTER 6 IP Security in Practice; 6.1 IP Security Issues; 6.2 Security Goals; 6.3 Encryption and Authentication Algorithms; 6.4 IPsec: The Protocols; 6.5 IP and IPsec; 6.6 Implementing and Deploying IPsec; 6.7 Conclusion; CHAPTER 7 Security in Wireless Systems; 7.1 Introduction; 7.2 Security and Privacy Needs of a Wireless System; 7.3 Required Features for a Secured Wireless Communications System; 7.4 Methods of Providing Privacy and Security in Wireless Systems; 7.5 Wireless Security and Standards
,
7.6 IEEE 802.11 Security7.7 Security in North American Cellular/PCS Systems; 7.8 Security in GSM, GPRS, and UMTS; 7.9 Data Security; 7.10 Air Interface Support for Authentication Methods; 7.11 Summary of Security in Current Wireless Systems; 7.12 Conclusion; References; CHAPTER 8 Mobile Security and Privacy; 8.1 Security Primer; 8.2 Cellular Network Security; 8.3 Wireless LAN Security; 8.4 Bluetooth Security; 8.5 Ad Hoc Network Security; 8.6 Mobile Privacy; 8.7 Conclusion; Further Reading; References; CHAPTER 9 Optical Network Survivability; 9.1 Basic Concepts; 9.2 Protection in SONET/SDH
,
9.3 Protection in IP Networks9.4 Why Optical Layer Protection; 9.5 Optical Layer Protection Schemes; 9.6 Interworking between Layers; 9.7 Conclusion; Further Reading; References; CHAPTER 10 Intrusion Response Systems: A Survey; 10.1 Introduction; 10.2 Static Decision-Making Systems; 10.3 Dynamic Decision-Making Systems; 10.4 Intrusion Tolerance through Diverse Replicas; 10.5 Responses to Specific Kinds of Attacks; 10.6 Benchmarking Intrusion Response Systems; 10.7 Thoughts on Evolution of IRS Technology; 10.8 Conclusion; References; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T; U
Additional Edition:
ISBN 0123744636
Additional Edition:
Erscheint auch als Druck-Ausgabe Network security Burlington, MA, USA : Morgan Kaufmann, c2008
Language:
English
Keywords:
Electronic books
;
Electronic books
Bookmarklink