HOME | ÃâÆÇ»ç ¼Ò°³ | »ó´ã ¸ÞÀÏ

Áø»ù¹Ìµð¾î °í°´»ó´ã TEL.02-353-4421 FAX.02-353-4431 MAIL. book@jinsaem.co.kr  

µµ¼­ °Ë»ö (by ¼­¸í/ÀúÀÚ/ISBN)



Network Security Essentials 6/e

ÀúÀÚ : Stallings 

¿ªÀÚ :  

°¡°Ý : \42,000 

ISBN-10 : 1292154853    ISBN-13 : 9781292154855 

ÃâÆÇ»ç : Pearson 

ÃâÆdzâ : 2017

ÆäÀÌÁö : 464 pages

°ü·ÃÀÚ·á :

Network Securities: Applications and Standards provides the following features to facilitate learning:
UPDATED! The text includes the most recent innovations in a comprehensive coverage of the field.
*UPDATED! Professors in the field have reviewed this book since the last edition to clarify and tighten the narrative and improve illustrations.
*NEW! Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X.
*NEW! Section on cloud security covers the security issues related to cloud computing.
*NEW! Online chapter on SHA-3 discusses the new cryptographic hash standard, which was adopted in 2012.
*NEW! Section on mobile device security introduces this essential aspect of enterprise network security.
*UPDATED! Chapter on malicious software now focuses on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms.
*NEW! Sample Syllabi guide instructors in using the text for a limited amount of time.
*NEW! Learning Objectives begin each chapter.

The text is organized into three parts to help students better retain core subjects
*Part I: Cryptography presents a concise survey of the cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, message authentication, and digital signatures.
*Part II: Network Security Applications covers important network security tools and applications such as key distribution, Kerberos, X.509v3 certificates, Extensible Authentication Protocol, S/MIME, IP Security, SSL/TLS, IEEE 802.11i WiFi security, and cloud security.
*Part III: System Security looks at system-level security issues including the threat of countermeasures for malicious software and intruders and the use of firewalls. 

 

Chapter 1 Introduction
1.1.Computer Security Concepts
1.2.The OSI Security Architecture
1.3.Security Attacks
1.4.Security Services
1.5.Security Mechanisms
1.6.Fundamental Security Design Princples
1.7.Attack Surfaces and Desing Principles
1.8.A Model for Network Security
1.9.Standards
1.10.Key Terms,Review Questions,and Problems

PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1.Symmetric Encryption Principles
2.2.Symmetric Block Encryption Algorithms
2.3.Random and Pseudorandom Numbers
2.4.Stream Ciphers and RC4
2.5.Cipher Block Modes of Operation
2.6.Recommended Reading
2.7.Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1.Approaches to Message Authentication
3.2.Secure Hash Functions
3.3.Message Authentication Codes
3.4.Public Key Cryptography Principles
3.5.Public-Key Cryptography Algorithms
3.6.Digital Signatures
3.7.Key Terms, Review Questions, and Problems

PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Key Distribution and User Authentication
4.1.Remotc User Authentication Principles
4.2.Symmetric Key Distribution Using Symmetric Encryption
4.3.Kerberos
4.4.Key Distribution Using Asymmetric Encryption
4.5.X.509 Certificates
4.6.Public Key Infrastructure
4.7.Federated Identity Management
4.8.Key Terms, Review Questions, and Problems
Chapter 5 Network Access Control and Cloud Security
5.1.Network Access Control
5.2.Extensible Authentication Protocol
5.3.IEEE 802.1X Port-Based Network Access Control
5.4.Cloud Computing
5.5.Cloud Security Risks and Countermeasures
5.6.Data Protection in the Cloud
5.7.Cloud Security as a Service
5.8.Addressing Cloud Computing Security Concerns
5.9.Key Terms, Review Questions, and Problems
Chapter 6 Transport-Level Security
6.1.Web Security Considerations
6.2.Transport Layer Security (TLS)
6.3.HTTPS
6.4.Secure Shell (SSH)
6.5.Key Terms, Review Questions, and Problems
Chapter 7 Wireless Network Security
7.1.Wireless Security
7.2.Mobile Device Security
7.3.IEEE 802.11 Wireless LAN Overview
7.4.IEEE 802.11i Wireless LAN Security
7.5.Key Terms, Review Questions, and Problems
Chapter 8 Electronic Mail Security
8.1.Internet Mail Architecture
8.2.E-mail Formats
8.3.E-mail Threats and Comprehensive E-mail Security
8.4.S/MIME
8.5.Pretty Good Privacy (PGP)
8.6.DNSSEC
8.7.DNS-Based Authentication of Named Entities
8.8.Sender Policy Framework
8.9.DomainKeys Identified Mail (DKIM)
8.10.Domain-Based Message Authentication,Reportig,and Conformance
8.11.Key Terms, Review Questions, and Problems
Chapter 9 IP Security
9.1.IP Security Overview
9.2.IP Security Policy
9.3.Encapsulating Security Payload
9.4.Combining Security Associations
9.5.Internet Key Exchange
9.6.Cryptographic Suites
9.7.Key Terms, Review Questions, and Problems

PART THREE SYSTEM SECURITY
Chapter 10 Malicious Software
10.1.Types of Malicious Software
10.2.Advanced Persistent Threat
10.3.Propagation - Infected Content - Viruses
10.4.Propagation - Vulnerability Exploit - Worms
10.5.Propagation - Social Engineering - SPAM, Trojans
10.6.Payload - System Corruption
10.7.Payload - Attack Agent - Zombie, Bots
10.8.Payload - Information Theft - Keyloggers, Phishing, Spyware
10.9.Payload Stealthing - Backdoors, Rootkits
10.10.Countermeasures
10.11.Distributed Denial of Service Attacks
10.12.Key Terms, Review Questions, and Problems
Chapter 11 Intruders
11.1.Intruders
11.2.Intrusion Detection
11.3.Password Management
11.4.Key Terms, Review Questions, and Problems
Chapter 12 Firewalls
12.1.The Need for Firewalls
12.2.Firewall Characteristics
12.3.Types of Firewalls
12.4.Firewall Basing
12.5.Firewall Location and Configurations
12.6.Key Terms, Review Questions, and Problems 

 

William Stallings 

 



¼­¿ï½Ã ÀºÆò±¸ ¿¬¼­·Î 5±æ 28 ºÎÈ£¾ÆÆÄÆ® 102µ¿ »ó°¡ 5È£
TEL. (02) 353-4421 FAX. (02) 353-4431
EMAIL. book@jinsaem.co.kr