E-Book, Englisch, 368 Seiten, Web PDF
Joshi Network Security: Know It All
1. Auflage 2008
ISBN: 978-0-08-056015-1
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 368 Seiten, Web PDF
ISBN: 978-0-08-056015-1
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Examples illustrate core security concepts for enhanced comprehension
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Network Security: Know It All;4
3;Copyright Page;5
4;Contents;6
5;About the Authors;10
6;CHAPTER 1 Network Security Overview;16
6.1;1.1 Cryptographic Tools;17
6.2;1.2 Key Predistribution;27
6.3;1.3 Authentication Protocols;32
6.4;1.4 Secure Systems;40
6.5;1.5 Firewalls;53
6.6;1.6 Conclusion;57
6.7;Further Reading;59
7;CHAPTER 2 Network Attacks;62
7.1;2.1 Introduction;62
7.2;2.2 Network Attacks and Security Issues;62
7.3;2.3 Protection and Prevention;69
7.4;2.4 Detection;76
7.5;2.5 Assessment and Response;77
7.6;2.6 Conclusion;78
7.7;References;78
8;CHAPTER 3 Security and Privacy Architecture;80
8.1;3.1 Objectives;80
8.2;3.2 Background;81
8.3;3.3 Developing a Security and Privacy Plan;82
8.4;3.4 Security and Privacy Administration;83
8.5;3.5 Security and Privacy Mechanisms;87
8.6;3.6 Architectural Considerations;95
8.7;3.7 Conclusion;100
9;CHAPTER 4 Network Security Algorithms;102
9.1;4.1 Searching for Multiple Strings in Packet Payloads;104
9.2;4.2 Approximate String Matching;108
9.3;4.3 IP Traceback via Probabilistic Marking;110
9.4;4.4 IP Traceback via Logging;114
9.5;4.5 Detecting Worms;117
9.6;4.6 Conclusion;120
10;CHAPTER 5 Concepts in IP Security;122
10.1;5.1 The Need for Security;123
10.2;5.2 Choosing Where to Apply Security;125
10.3;5.3 Components of Security Models;129
10.4;5.4 IPsec;133
10.5;5.5 Transport-Layer Security;140
10.6;5.6 Securing the Hypertext Transfer Protocol;147
10.7;5.7 Hashing and Encryption: Algorithms and Keys;148
10.8;5.8 Exchanging Keys;155
10.9;Further Reading;161
11;CHAPTER 6 IP Security in Practice;164
11.1;6.1 IP Security Issues;165
11.2;6.2 Security Goals;167
11.3;6.3 Encryption and Authentication Algorithms;170
11.4;6.4 IPsec: The Protocols;175
11.5;6.5 IP and IPsec;177
11.6;6.6 Implementing and Deploying IPsec;187
11.7;6.7 Conclusion;188
12;CHAPTER 7 Security in Wireless Systems;190
12.1;7.1 Introduction;190
12.2;7.2 Security and Privacy Needs of a Wireless System;192
12.3;7.3 Required Features for a Secured Wireless Communications System;200
12.4;7.4 Methods of Providing Privacy and Security in Wireless Systems;200
12.5;7.5 Wireless Security and Standards;202
12.6;7.6 IEEE 802.11 Security;202
12.7;7.7 Security in North American Cellular/PCS Systems;204
12.8;7.8 Security in GSM, GPRS, and UMTS;208
12.9;7.9 Data Security;213
12.10;7.10 Air Interface Support for Authentication Methods;221
12.11;7.11 Summary of Security in Current Wireless Systems;222
12.12;7.12 Conclusion;225
12.13;References;225
13;CHAPTER 8 Mobile Security and Privacy;226
13.1;8.1 Security Primer;227
13.2;8.2 Cellular Network Security;246
13.3;8.3 Wireless LAN Security;252
13.4;8.4 Bluetooth Security;260
13.5;8.5 Ad Hoc Network Security;263
13.6;8.6 Mobile Privacy;268
13.7;8.7 Conclusion;273
13.8;Further Reading;274
13.9;References;275
14;CHAPTER 9 Optical Network Survivability;278
14.1;9.1 Basic Concepts;280
14.2;9.2 Protection in SONET/SDH;284
14.3;9.3 Protection in IP Networks;297
14.4;9.4 Why Optical Layer Protection;298
14.5;9.5 Optical Layer Protection Schemes;306
14.6;9.6 Interworking between Layers;319
14.7;9.7 Conclusion;320
14.8;Further Reading;321
14.9;References;321
15;CHAPTER 10 Intrusion Response Systems: A Survey;324
15.1;10.1 Introduction;324
15.2;10.2 Static Decision-Making Systems;327
15.3;10.3 Dynamic Decision-Making Systems;332
15.4;10.4 Intrusion Tolerance through Diverse Replicas;342
15.5;10.5 Responses to Specific Kinds of Attacks;346
15.6;10.6 Benchmarking Intrusion Response Systems;350
15.7;10.7 Thoughts on Evolution of IRS Technology;353
15.8;10.8 Conclusion;354
15.9;References;355
16;Index;358
16.1;A;358
16.2;B;358
16.3;C;358
16.4;D;359
16.5;E;359
16.6;F;359
16.7;G;359
16.8;H;359
16.9;I;360
16.10;K;361
16.11;L;361
16.12;M;361
16.13;N;361
16.14;O;361
16.15;P;362
16.16;R;362
16.17;S;362
16.18;T;363
16.19;U;364
16.20;V;364
16.21;W;364