Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Network Security Essentials: Applications and Standards [Paperback]

William Stallings
4.2 out of 5 stars  See all reviews (4 customer reviews)

Available from these sellers.


Formats

Amazon Price New from Used from
Hardcover --  
Paperback CDN $69.23  
Paperback, Nov. 22 1999 --  
There is a newer edition of this item:
Network Security Essentials Applications and Standards (5th Edition) Network Security Essentials Applications and Standards (5th Edition)
CDN$ 99.57
Usually ships in 3 to 5 weeks

Book Description

Nov. 22 1999 0130160938 978-0130160935 1
This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange.

Features and Benefits

Up to date treatment of Web security-presents students with discussions on the two most important Web security standards SSL/TLS and SET.
Unified presentation of intruders and viruses-shows students the distinct threats and similarities of hackers and viruses, in order to promote a greater understanding of both topics.
Both PGP and S/MIME for electronic mail security-familiarises students with the two most important approaches to e-mail security enabling them to gain an understanding of both schemes at a detailed technical level.
Treatment of firewalls-allows students to explore an integral part of any network security capability.
Concise overview of cryptography, authentication, and digital signatures.
Gives students a solid yet concise look at the fundamental algorithms and techniques underlying network security.
Chapter-end homework problems-introduces students to new concepts and techniques, and reinforces material in the text with over 100 problems.
Text-Specific Website Includes slides, errata, and links to important sites, organised according to chapters in the text.


Customers Who Bought This Item Also Bought


Product Details


Product Description

From the Inside Flap

Preface In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. Objectives It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed. Intended Audience The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study. Plan of the Book The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols

i

report underlying network security applications, including encryption, hash functions,

digital signatures, and key exchange.

i

See Appen~ II.

Network Security Applications: Covers important network security tools and

applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu-

rity, SSL/TLS, SET, and SNMPv3. III.

System Security: Looks at system-level security issues, including the threat of

and countermeasures for intruders and viruses, and the use of firewalls and

trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~

(CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used

detailed anInternet Services for Instructors and Students There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at shore/-ws/NetSec.html. An Internet mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author. As soon as typos or other errors are discovered, an errata list for this book will be available at shore/-ws. Projects for Teaching Network Security For many instructors, an important component of a cryptography or security course is a project or set of projects by which the student gets hands-on experience to rein force concepts from the text. This book provides an unparalleled degree of support for including a projects component in the course. The instructor's manual not only includes guidance on how to assign and structure the projects, but also includes a set of suggested projects that covers a broad range of topics from the text:

• Research Projects: A series of research assignments that instruct the student

to research a particular topic on the Internet and write a report. •

Programming Projects: A series of programming projects that cover a broad range of topics and that can be implemented in any suitable language on any platform. •

Reading/Report Assignments: A list of papers in the literature, one for each chapter, that can be assigned for the student to read and then write a short report. See Appendix B for details. Realtionship to Crytography and Network Security, Second Edition This book is on spin-off from Cryptography and Network Security, Second Edition (CNS2e). CNS2e provides a substantial treatment of cryptography, including detailed analysis of algorithms and a significant mathematical component, the whole of which covers over 300 pages. Network Security Essentials: Applications and Standards (NSEle) provides instead a concise overview of these topics in Chapters 2 and 3. NSEle includes all of the remaining material of CNS2e, with updates. NSEle also covers SNMP security, which is not covered in CNS2e. Thus, NSEle is intended for college courses and professional readers where the interest is primarily in the application of network security, without the need or desire to delve deeply in to cryptographic theory and principles.

From the Back Cover

As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking.
Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security.
Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features.
Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET.
Chapters on Web security and network management security (SNMPv3).
Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.
On-line transparency masters, an Internet mailing list, and links to relevant Web sites are available at

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

3 star
0
2 star
0
1 star
0
4.2 out of 5 stars
4.2 out of 5 stars
Most helpful customer reviews
1 of 1 people found the following review helpful
By A Customer
Format:Paperback
I purchased this book as part of the required reading for an Information Security class at UCLA. From the start the book was full of very technical and detailed information. Having little practical network experience, my first reading focused on grasping the low-hanging fruit. As I read the book a second and third time I picked up some serious knowledge. It seemed like everytime I re-read a chapter there was more there to glean. I'm now studying for the CISSP and CISA. My initial cold self-assessments returned scores in the 80%-100% range. That's without CISSP/CISA-specific studying. I attribute most of that knowledge to this book. This was money well spent!
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Quick & Dirty Oct. 24 2000
Format:Paperback
This book appears to be a shorter, more concise version of Stallings' "Cryptography and Network Security: Principles and Practice." It has a much shorter, and therefore less complete treatment of security concepts in general and specifically cryptography. It might be good for a focused introductory course on network-level security, but there's not much there about application-level security. Overall, I found it a little terse. I like Stallings' books on networks and computer architecture better.
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Pretty good book for serious beginners Sept. 7 2000
Format:Paperback
Pretty good starting book for serious beginners in the network security area. Give you an in-depth overview of cryptography (part 1) and network security (part 2). The system security (part 3) is kind of weak. Most of the discussion are rather theoretic than practical, so you need another more practical book as companion. Anyway, understanding the contents of the book will lay a solid foundation for further exploring in the network security. BTW, if you hate math, this won't be a book for you!
Was this review helpful to you?
4.0 out of 5 stars no title May 18 2000
By A Customer
Format:Paperback
this book is very good for beginners in network security area.
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.3 out of 5 stars  11 reviews
11 of 12 people found the following review helpful
5.0 out of 5 stars For folks serious about learning network security Dec 22 2002
By A Customer - Published on Amazon.com
Format:Paperback
I purchased this book as part of the required reading for an Information Security class at UCLA. From the start the book was full of very technical and detailed information. Having little practical network experience, my first reading focused on grasping the low-hanging fruit. As I read the book a second and third time I picked up some serious knowledge. It seemed like everytime I re-read a chapter there was more there to glean. I'm now studying for the CISSP and CISA. My initial cold self-assessments returned scores in the 80%-100% range. That's without CISSP/CISA-specific studying. I attribute most of that knowledge to this book. This was money well spent!
11 of 12 people found the following review helpful
4.0 out of 5 stars Pretty good book for serious beginners Sept. 7 2000
By Robert C. - Published on Amazon.com
Format:Paperback
Pretty good starting book for serious beginners in the network security area. Give you an in-depth overview of cryptography (part 1) and network security (part 2). The system security (part 3) is kind of weak. Most of the discussion are rather theoretic than practical, so you need another more practical book as companion. Anyway, understanding the contents of the book will lay a solid foundation for further exploring in the network security. BTW, if you hate math, this won't be a book for you!
13 of 15 people found the following review helpful
4.0 out of 5 stars Quick & Dirty Oct. 24 2000
By jeremycec - Published on Amazon.com
Format:Paperback
This book appears to be a shorter, more concise version of Stallings' "Cryptography and Network Security: Principles and Practice." It has a much shorter, and therefore less complete treatment of security concepts in general and specifically cryptography. It might be good for a focused introductory course on network-level security, but there's not much there about application-level security. Overall, I found it a little terse. I like Stallings' books on networks and computer architecture better.
6 of 8 people found the following review helpful
3.0 out of 5 stars Hard to believe this book is by Stallings May 21 2006
By Tesfaye Lemma - Published on Amazon.com
Format:Paperback|Verified Purchase
I had to use this book for my Network Security class at grad level. Bits and pieces here and there do not help anyone who wants to learn the details of NW Security; but this book is what it is. I have used several Stallings' books and they are, at least in most cases, detail oriented and some of the best in the market. It is even harder for me to comprehend that Cryptography and NW Security Management are covered in the book in just 21 pages and 11 pages consecutively (but divided by other names later in the book with no tangible useage). See, if you want to learn Network Security, especially if you are employed in the area, I don't think you would appreciate just 21 pages of coverage of Cryptography. Not getting anything new in a chapter like that would be just too lame for you. Yes, the book refers to Applications and Standards in the subtitle but without implementation techniques and not a string of code that you usually find in your professional magazine subscription (from a programmer's perspective).

However, if you are interested in Cryptography types or the strength of Symmetric Algorithm, DES or RC5 or Blowfish or DES or triple DES (3DES); go ahead and read it. After all it is by Stallings. You also will find some tricks on Message Authentication without Message Encryption. Humm...? Anyhow, if you are a programmer and want to program some SecIS or SecSDLS, this is not for you. My professor's recommendation of this book even made me question my capable instructor. The good thing in the class? My professor had to develop his own lecture for each class...it was much better!!! I hope this helps and Good luck!

TWL
1 of 1 people found the following review helpful
5.0 out of 5 stars Typical Stallings Book May 13 2011
By J. Jones - Published on Amazon.com
Format:Paperback
This is another great book from Stallings. I'm certified CISSP and CCNP-Security. I picked it up at the Southern Polytechnic State University Book Store. It covers the basics of security in extensive detail from an engineering perspective. I keep it on my bookshelf at work. It is a great reference for anyone on the security field.
Search Customer Reviews
Only search this product's reviews
ARRAY(0xa8fda7e0)

Look for similar items by category


Feedback