Network security essentials applications and standards
Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system s...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Harlow, Essex
Pearson Educational Limited
2014
|
| Edition: | Fifth edition, international edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Ch. 1 Introduction
- Pt. 1 Cryptography
- Ch. 2 Symmetric Encryption and Message Confidentiality
- Ch. 3 Public-Key Cryptography and Message Authentication
- Pt. 2 Network Security Applications
- Ch. 4 Key Distribution an User Authentication
- Ch. 5 Network Access Control and Cloud Security
- Ch. 6 Transport-Level Security
- Ch. 7 Wireless Network Security
- Ch. 8 Electronic Mail Security
- Ch. 9 IP Security
- Pt. 3 System Security
- Ch. 10 Malicious Software
- Ch. 11 Intruders
- Ch. 12 Firewalls
- App. A Some Aspects of Number Theory
- App. B Projects for Teaching Network Security
- References
- Index.


