Network and internetwork security principles and practice
In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs,...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Englewood Cliffs, N.J. New York
Prentice Hall ; IEEE
1995
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 19009 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241218061315.0 | ||
| 008 | s1995 njua bi 000 0 eng d | ||
| 020 | |a 0024154830 (hbk) | ||
| 020 | |a 0131800507 (pbk) | ||
| 020 | |a 0780311078 (IEEE) | ||
| 039 | 9 | |a 201502121519 |b zul |c 201408191112 |d shahrim |y 200910091016 |z VLOAD | |
| 040 | |a UPNM | ||
| 090 | |a TK 5105.5 |b .S728 1995 | ||
| 100 | 1 | |a Stallings, William | |
| 245 | 1 | 0 | |a Network and internetwork security |b principles and practice |c William Stalling |
| 260 | |a Englewood Cliffs, N.J. |b Prentice Hall ; |a New York |b IEEE |c 1995 | ||
| 300 | |a xiii, 462 p |b ill. |c 24 cm. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Ch. 1. Overview -- Ch. 2. Conventional Encryption -- Ch. 3. Confidentiality Using Conventional Encryption -- Ch. 4. Public-Key Cryptology -- Ch. 5. Authentication and Digital Signatures -- Ch. 6. Intruders, Viruses, and Worms -- Ch. 7. Cryptographic Algorithms -- Ch. 8. Authentication and Key Exchange -- Ch. 9. Electronic Mail Security -- Ch. 10. Network Management Security. | |
| 520 | |a In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. | ||
| 650 | 0 | |a Computer network |x security measures. | |
| 650 | 0 | |a Computer security. | |
| 999 | |a vtls000018956 |c 19009 |d 19009 | ||


