Network security know it all

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network sec...

Descripción completa

Detalles Bibliográficos
Otros Autores: Joshi, James B. D. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Morgan Kaufmann/Elsevier c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627546006719
Tabla de Contenidos:
  • Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan
  • 3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol
  • 5.7 Hashing and Encryption: Algorithms and Keys5.8 Exchanging Keys; Further Reading; CHAPTER 6 IP Security in Practice; 6.1 IP Security Issues; 6.2 Security Goals; 6.3 Encryption and Authentication Algorithms; 6.4 IPsec: The Protocols; 6.5 IP and IPsec; 6.6 Implementing and Deploying IPsec; 6.7 Conclusion; CHAPTER 7 Security in Wireless Systems; 7.1 Introduction; 7.2 Security and Privacy Needs of a Wireless System; 7.3 Required Features for a Secured Wireless Communications System; 7.4 Methods of Providing Privacy and Security in Wireless Systems; 7.5 Wireless Security and Standards
  • 7.6 IEEE 802.11 Security7.7 Security in North American Cellular/PCS Systems; 7.8 Security in GSM, GPRS, and UMTS; 7.9 Data Security; 7.10 Air Interface Support for Authentication Methods; 7.11 Summary of Security in Current Wireless Systems; 7.12 Conclusion; References; CHAPTER 8 Mobile Security and Privacy; 8.1 Security Primer; 8.2 Cellular Network Security; 8.3 Wireless LAN Security; 8.4 Bluetooth Security; 8.5 Ad Hoc Network Security; 8.6 Mobile Privacy; 8.7 Conclusion; Further Reading; References; CHAPTER 9 Optical Network Survivability; 9.1 Basic Concepts; 9.2 Protection in SONET/SDH
  • 9.3 Protection in IP Networks9.4 Why Optical Layer Protection; 9.5 Optical Layer Protection Schemes; 9.6 Interworking between Layers; 9.7 Conclusion; Further Reading; References; CHAPTER 10 Intrusion Response Systems: A Survey; 10.1 Introduction; 10.2 Static Decision-Making Systems; 10.3 Dynamic Decision-Making Systems; 10.4 Intrusion Tolerance through Diverse Replicas; 10.5 Responses to Specific Kinds of Attacks; 10.6 Benchmarking Intrusion Response Systems; 10.7 Thoughts on Evolution of IRS Technology; 10.8 Conclusion; References; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T
  • U