Book description
Introductory textbook in the important area of network security for undergraduate and graduate students
- Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security
- Fully updated to reflect new developments in network security
- Introduces a chapter on Cloud security, a very popular and essential topic
- Uses everyday examples that most computer users experience to illustrate important principles and mechanisms
- Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec
Table of contents
- Cover
- Title Page
- Copyright
- Preface
- About the Author
- Chapter 1: Network Security Overview
- Chapter 2: Data Encryption Algorithms
- Chapter 3: Public-Key Cryptography and Key Management
- Chapter 4: Data Authentication
-
Chapter 5: Network Security Protocols in Practice
- 5.1 Crypto Placements in Networks
- 5.2 Public-Key Infrastructure
- 5.3 IPsec: A Security Protocol at the Network Layer
- 5.4 SSL/TLS: Security Protocols at the Transport Layer
- 5.5 PGP and S/MIME: Email Security Protocols
- 5.6 Kerberos: An Authentication Protocol
- 5.7 SSH: Security Protocols for Remote Logins
- 5.8 Electronic Voting Protocols
- 5.9 Closing Remarks
- 5.10 Exercises
- Chapter 6: Wireless Network Security
- Chapter 7: Cloud Security
- Chapter 8: Network Perimeter Security
- Chapter 9: Intrusion Detections
- Chapter 10: The Art of Anti-Malicious Software
- Appendix A. 7-bit ASCII code
- Appendix B. SHA-512 Constants (in Hexadecimal)
- Appendix C. Data Compression Using ZIP
- Appendix D. Base64 Encoding
- Appendix E. Cracking WEP Keys Using WEPCrack
- Appendix F. Acronyms
- Further Readings
- Index
- End User License Agreement
Product information
- Title: Introduction to Network Security, 2nd Edition
- Author(s):
- Release date: October 2015
- Publisher(s): Wiley
- ISBN: 9781118939482
You might also like
book
Hands-On Dark Web Analysis
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …