Book Details

Instructors may access teaching resources by clicking the ‘Request Instructor Resources’ tab next to the title.
Please note that you can subscribe to a maximum of 2 titles.

Network Security Essentials: Applications and Standards, 6/e


Network Security Essentials: Applications and Standards, 6/e
Author(s)  William Stallings
ISBN  9789352866601
Imprint  Pearson Education
Copyright  2018
Pages  472
Binding  Paperback
List Price  Rs. 890.00
  
 
 

Network Securities Essentials: Applications and Standards introduces students to the critical
importance of Internet security in our age of universal electronic connectivity. Amidst viruses,
hackers, and electronic fraud, organizations and individuals are constantly at risk of having their
private information compromised. This creates a heightened need to protect data and resources
from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

The Sixth Edition covers the expanding developments in the cryptography and network security
disciplines, giving students a practical survey of applications and standards. The text places emphasis
on applications widely used for Internet and corporate networks, as well as extensively deployed
Internet standards.
 

  • About the Author
  • Contents
  • Features
  • Downloadable Resources

William Stallings


 

 

1. Introduction


2. Symmetric Encryption and Message


3. Public-Key Cryptography and Message


4. Key Distribution and User Authentication


5. Network Access Control and Cloud Security


6. Transport-Level Security


7. Wireless Network Security


8. Electronic Mail Security


9. IP Security


10. Malicious Software


11. Intruders


12. Firewalls


 

 

New to this edition:


1. Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X


2. Section on cloud security covers the security issues related to cloud computing


3. Section on mobile device security introduces this essential aspect of enterprise network security


4. Thoroughly updated chapter on malicious software focusing on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms


 

 
 
Username/ Email  
Password  
If you are new to this site, and you do not have a username and password, please register.