Table of contents for Network security essentials : applications and standards / William Stallings.


Bibliographic record and links to related information available from the Library of Congress catalog
Note: Electronic data is machine generated. May be incomplete or contain other coding.


Counter
Chapter I   ntroduction 1
1.1    S  urit 1Trends 4
1.2   (Te (OSI Secnrity Architecture
1.3     ec orty Attac  7
1.4    Secuitv  S  ervices 11
1.5    Securit r Mecai sm 14
1.6    A Mode] or niternet oark Securlity
1,7    Internet Staidards re lnternet Societr 19
1.8    Outine ofbhis Book 22
1.9     Renomn ened Reading, 23
1.10   Intrne t and Web Rasources 23
I 11   K1e Ter ims Review Qluestionsr and Problems 25
ART ONE CRYPTOGRAPHMY 26
Chapter 2 :Symmetric Encryption and Message Confidentiality 28
21     Syniimtric Encryption Pritciples 29
2.2    S    retric Block Eltcryption Algoritrii  35
2.3     Stream C iphers and RC4 4
2.4   (Cipher Block Modes of Operation 46
2.5      ocation of Erncr toon Devices 51
2.6    Key listribuiion 52
2.7      < ccoil ndi d Rea aini and Web Sites 55
2.8     Kev Termsis Review )Questio, and Problemis 6
apter 3   Public-Key Cryptography and Message Authentication 59
3.1    Appoachelis to Message Authentication 6
3.2    Seclue iash Fuctions and H MAC 64
3 3    P: blic Ke Cryp to grapm  Principles 74
3.4     Public-Key Cryptogrphy Algorithims 78
35      i)iitora Signaiitures 5
3.6   IKy Management 85
3.7     R eco  ended Reading and Web Sites 87
3.     Key Tii Rev iew (Questions,x and Problems 88
'iRT TWO NETWORK SECURITY APPLICATIONS 92
CMpter 4   Authentication Applications 94
4.1    eCrbeos 95
4.2    X59 Dire ctor Authentication Serice 113
4.3     Public Kev Inliastructun 122
4.4    R ecommenided Reading ad Web Sites 124
4.4     Ke Teroms, Review Questions, and Problems 125
Appendix 4A: Kerberos Encryption Techniques 127
Chapter 5  Flectronic Mail Security 130
5.1     Pretty Good Privacy (PGP) 132
5.2    S/MIME 151
5.3    Recom mendedWeb Sites 168
5.4    Ky T: e rms, Review Questions and Problems 168
Appendix 5A: Data Coipression Using ZIP 169
Appendix 5B: Radix-64 Conversion 172
Appendix 5C: PGP Random Number Generation 173
Chapter 6 IP Security 177
6.1    IP Security Overview 179
6.2    IP Security Architecture 181
6.3    Authentication Header 187
6.4     Encapsulating Security Payload 192
6.5    C ombining Security Associations 197
6.6    Kev Management 200
6.7    Recommended Reading and Web Sites 210
6.8    Key Terms Review Questions, and Problems 211
Appendix 6A: Internetworking and Internet Protocols 212
Chapter 7 Web Security 221
7.1    Web Security Requirements 222
7.2    Secure Sockets Laer (SSL) and Trasport Layer Security (TLS) 225
7.3    Secre Electronic Transaction (SET) 243
7.4    R conmmended Readin and Web Sites 254
7.5    Key [erms, Review Questions, and Problems 255
Chapter 8 Network Management Security 257
8.1    Basic Concepts of SNMP 258
8.2    SNMPvl Community Fa ility 266
8.3    SNMPV3 269
8.4    Recommended Reading and Web Sites 292
8.5    Key Termsi Review Questions and Problems 293
PART THREE SYSTEM SECURITY 297
Chapter 9 Intruders 299
9.1    Intruders 301
9.2    Intrusion Detection 304
9.3    Password Maiinagement 316
9.4    Recomnended Reading and Web Sites 325
9.5    Key terms, Review Questions, and Problems 326
Appendix 9A:The Base-Rate Fallacy 328
Chapter 10 Malicious Software 332
1.1     Viiusi   d Rdlatd Thrc s 333
10.2     VIru Con nter cliTi -r 344
10.3     >isributcd Deni of Service eArrtac.ks 34
0.4     R     i mm1dd R dI Ss  ;s 36 S
1.3    C( imon Ci ria    r   n   nforna  I rch nolog Secur it E auation 374
. 4      PR comii nded R ead g and iWeb SitCe 378
11.5     Key e ics. Re vite Quesrios ui nd Problemns 37
APPENDICES 381
Appendix A     Some Aspects of Number Theory 381
A I     Prime aid C lativIyv Prime Nuimbers 32
A.2     Modular Ari hmrlm   384
Appendix B     Projects for Teaching Network Security 386
B.1     R  earch ProIec  387
B 2     Progr mming Pr jects 388
B.3      aboratory Exercises 388
B.4     Writig Asmsigients 388
B.5      eadiemg/R epot As< igmens 389



Library of Congress subject headings for this publication: Computer networks Security measures, Computer security