Network and internetwork security principles and practice

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs,...

Full description

Saved in:
Bibliographic Details
Main Author: Stallings, William
Format: Book
Language:English
Published: Englewood Cliffs, N.J. New York Prentice Hall ; IEEE 1995
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Ch. 1. Overview
  • Ch. 2. Conventional Encryption
  • Ch. 3. Confidentiality Using Conventional Encryption
  • Ch. 4. Public-Key Cryptology
  • Ch. 5. Authentication and Digital Signatures
  • Ch. 6. Intruders, Viruses, and Worms
  • Ch. 7. Cryptographic Algorithms
  • Ch. 8. Authentication and Key Exchange
  • Ch. 9. Electronic Mail Security
  • Ch. 10. Network Management Security.