Paramount Books PVT Ltd.
Home About us Contact us FAQ/ Help How to Pay How to Order Online Customer Feedback
Untitled Document
 OUR PUBLICATIONS NEW ARRIVALS BESTSELLER TOP BOOKS DISCOUNT OFFERS QUOTATION REQUEST REFER TO A FRIEND
Search Item
LOGIN / REGISTER
ADVANCE SEARCH
                         SEARCH     
Untitled Document
RAMADAN SPECIAL
CATEGORIES
BUSINESS
CHILDREN BOOKS
COMPUTER SCIENCE
ENGINEERING
GENERAL INTEREST
MEDICAL BOOKS
SCIENCE
SOCIAL SCIENCES
LOOK FOR MORE
  AUTHORS
  PUBLISHERS
  SERIES
  SUMMER READING PROGRAMME
  SPECIAL DISCOUNT
CATALOGUES
  PARAMOUNT GENERAL 2019
  PRE-PRIMARY & PRIMARY 2019
  SECONDARY 2019
  MEDICAL BOOKS 2019
Untitled Document
Special Offer
Untitled Document
Untitled Document Untitled Document
NEW ARRIVALS
OBJECT-ORIENTED PROGRAMMING USING JAVA (pb) 2018
CAMBRIDGE IGCSE® COMPUTER SCIENCE WORKBOOK (pb)2016
CLOUD COMPUTING (pb) 2013
Untitled Document
SPECIAL PRICES
WRITING COPY FOR THE WEB IN A WEEK: (pb)2003
NETWORK SECURITY ESSENTIALS 3e(pb)2009
COMPUTER ORGANIZATION AND ARCHITECTURE 7e(pb)2009
SPREDSHEET TOOLS FOR ENGINEERS: EXXCEL 2000 VERSION 2e(pb)2002
INTERNET MARKETING: BUILDING ADVANTAGE IN A NETWORKED ECONOMY (W/CD) (pb)2002
DIGITAL IMAGE PROCESSING 2e(pb)2007
ELECTRONIC COMMERCE 2004: A MANAGERIAL PERSPECTIVE (pb)2004
ELECTRONIC COMMERCE 2004: A MANAGERIAL PERSPECTIVE (pb)2004
PROGRAMMING THE WORLD WIDE WEB 3e(pb)2007
CAMBRIDGE INTERNATIONAL AS AND A LEVEL COMPUTER SCIENCE COURSEBOOK (pb) 2016
Untitled Document
URDU BOOKS
RAPIDEX COMPUTER COURSE (URDU) (pb) 2009
Untitled Document
MOST POPULAR
SOFTWARE ARCHITECTURE AND MANAGEMENT (hb) 2017
CAMBRIDGE IGCSE® COMPUTER SCIENCE: PROGRAMMING BOOK (pb) 2016
DESIGNING THE USER INTERFACE: STRATEGIES FOR EFFECTIVE HUMAN-COMPUTER INTERACTION, 5e(pb)
NETWORK SECURITY ESSENTIALS :APPLICATION AND STANDARDS 6e (pb) 2018
GUIDE TO FIREWALLS AND VPNS, 3e(pb)2012
ADVANCED DIGITAL LOGIC DESIGN: USING VERILOG, STATE MACHINES AND SYNTHESIS FOR FPGA'S (pb) 2012
BAYESIAN METHODS FOR HACKERS (pb) 2018
MAKE: GETTING STARTED WITH 3D CARVING - FIVE STEP-BY-STEP PROJECTS TO LAUNCH YOU ON YOUR MAKER JOURNEY (pb) 2017
DESIGN AND ANALYSIS OF EXPERIMENTS (hb)
WRITING COPY FOR THE WEB IN A WEEK: (pb)2003
FREE NEWSLETTER
Join our mailing list to receive newsletter
Your Selected Book  








SimilarAuthorItemsAuthor
 RECOMMENDED
Computer Networking With Internet Protocols And Technology (pb)2004 by Stallings
Cryptography And Network Security 4e(pb)2006 by Stallings
Cryptography And Network Security 4e(pb)2008 by Stallings
Cryptography And Network Security 5e(pb)2011 by Stallings
Cryptography And Network Security, 7e (pb) 2017 by Stallings
Cryptography And Network Security: Principles And Practice 6e(pb) by Stallings
Cryptography And Network Security: Principles And Practices 4e(pb)2006 by Stallings
Cryptography And Network: Principles And Practice (pb)2006 by Stallings
Foundations Of Modern Networking: Sdn, Nfv, Qoe, Iot, And Cloud (pb)2016 by Stallings
High-speed Networks And Internets: Performance And Quality Of Service 2e(pb)2010 by Stallings
Viewed:  168      
Untitled Document
 PRICE INFORMATION
 List Price: INR 375.00  
 Price: PKR 195.00 You Pay:
 You Save: PKR 706.12 PKR 176.00

Note: The prices here are applicable only for our Retail customers in Pakistan.
 
 
ISBNSpecification
  SPECIFICATION
NETWORK SECURITY ESSENTIALS 3e(pb)2009
Author: WILLIAM STALLINGS
ISBN: 9788131716649
Year: 2009
Publisher: PEARSON EDUCATION ASIA
Category: NETWORKING / DISTRIBUTED SYSTEM
Edition: 3
Format: Paperback
Language: English
Pages: 409
 ABOUT THE TITLE
For one-semester courses on Network Security for computer science engineering and CIS majors. This text provides a practical up-to-date and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise treatment of the discipline of cryptography covering algorithms and protocols underlying network security applications encryption hash functions digital signatures and key exchange. Up-to-date treatment of Web security discusses the two most important Web security standards—SSL/TLS and SET.
• Unified presentation of intruders and viruses shows students the distinct threats and similarities of hackers and viruses in order to promote a greater understanding of both topics.
• Coverage of both PGP and S/MIME for electronic mail security familiarizes students with the two most important approaches to e-mail security enabling them to gain an understanding of both schemes at a detailed technical level.
• Treatment of firewalls explores this integral part of any network security capability.
• Concise overview of cryptography authentication and digital signatures gives students a solid yet concise look at the fundamental algorithms and techniques underlying network security.
• Chapter-end homework problems introduce students to new concepts and techniques and reinforce material in the text with more than 100 problems.
• Optional research projects guide students via a series of assignments through researching a particular topic on the Internet and writing a report.
Author:
William Stallings
Untitled Document
 TABLE OF CONTENTS
Preface
1. Introduction
1.1 The OSI Security Architecture
1.2 Security Attacks
1.3 Security Services
1.4 Security Mechanisms
1.5 A Model for Internetwork Security
1.6 Internet Standards the Internet Society
1.7 Outline of This Book
1.8 Recommended Reading
1.9 Internet and Web Resources
I. CRYPTOGRAPHY
2. Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Encryption Algorithms
2.3 Cipher Block Modes of Operation
2.4 Location of Encryption Devices
2.5 Key Distribution
2.6 Recommended Reading and Web Sites
2.7 Key Terms, Review Questions, and Problems
3. Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions and HMAC
3.3 Public Key Cryptography Principles
3.4 Public-Key Cryptography Algorithms
3.5 Digital Signatures
3.6 Key Management
3.7 Recommended Reading and Web Sites
3.8 Key Terms, Review Questions, and Problems
Appendix 3A Prime Numbers and Modular Arithmetic
II. NETWORK SECURITY APPLICATIONS
4. Authentication Applications
4.1 Kerberos
4.2 X.509 Directory Authentication Service
4.3 Public Key Infrastructure
4.4 Recommended Reading and Web Sites
4.4 Key Terms, Review Questions, and Problems
Appendix 4A: Kerberos Encryption Techniques
5. Electronic Mail Security
5.1 Pretty Good Privacy (PGP)
5.2 S/MIME
5.3 Recommended Web Sites
5.4 Key Terms, Review Questions, and Problems
Appendix 5A: Data Compression Using ZIP
Appendix 5B: Radix-64 Conversion
Appendix 5C: PGP Random Number Generation
6. IP Security
6.1 IP Security Overview
6.2 IP Security Architecture
6.3 Authentication Header
6.4 Encapsulating Security Payload
6.5 Combining Security Associations
6.6 Key Management
6.7 Recommended Reading and Web Sites
6.8 Key Terms, Review Questions, and Problems
Appendix 6A: Internetworking and Internet Protocols
7. Web Security
7.1 Web Security Requirements
7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
7.3 Secure Electronic Transaction (SET)
7.4 Recommended Reading and Web Sites
7.5 Key Terms, Review Questions, and Problems
8. Network Management Security
8.1 Basic Concepts of SNMP
8.2 SNMPv1 Community Facility
8.3 SNMPv3
8.4 Recommended Reading and Web Sites
8.5 Key Terms, Review Questions, and Problems
III. SYSTEM SECURITY
9. INTRUDERS
9.1 Intruders
9.2 Intrusion Detection
9.3 Password Management
9.4 Recommended Reading and Web Sites
9.5 Key Terms, Review Questions, and Problems Appendix
9A The Base-Rate Fallacy
10. MALICIOUS SOFTWARE
10.1 Viruses and Related Threats
10.2 Virus Countermeasures
10.3 Distributed Denial of Service Attacks
10.4 Recommended Reading and Web Sites
10.5 Key Terms, Review Questions, and Problems
11. FIREWALLS
11.1 Firewall Design Principles
11.2 Trusted Systems
11.3 Common Criteria for Information Technology Security Evaluation
11.4 Recommended Reading and Web Sites
11.5 Key Terms, Review Questions, and Problems
APPENDICES
A. Standards Cited in this Book
B. Some Aspects of Number Theory
B.1 Prime and Relatively Prime Numbers
B.2 Modular Arithmetic
C. Projects for Teaching Network Security
C.1 Research Projects
C.2 Programming Projects
C.3 Reading/Report Assignments
Glossary
References
Index
SimilarItems
 YOU MAY ALSO LIKE THESE BOOKS
50 Min: Networking For Success: The Art Of Establishing Personal Contacts (pb)2005 by Flynn
Active Defense: A Comprehansive Guide To Network Security (w/cd) by Brenton
Ad Hoc Networking (pb)2008 by Perkins
Ad Hoc Wireless Networks: Architectures And Protocols (pb) 2004 by Murthy
All In One Security+certification Exam Guide (pb)2006 by White

Application, Security, And Privacy (pb) by Frafinkel
Artificial Neural Networks (pb)2004 by Yegnanarayana
Artificial Neural Networks (pb)2011 by Schalkoff
Artificial Neural Networks: An Introduction (pb)2005 by Priddy
Atm Network: Concepts And B-isdn Signalling, Protocols, Networking (pb)2010 by Verma

Atm Networks 3e(pb)2009 by Foley
Atm Networks: Concepts Protocols Applications 3e(pb)2009 by Handel
Basics Of Networking (pb)2004 by Niit
Big Data Analytics In Cybersecurity (hb) 2017 by Savas
Biometrics For Network Security (pb)2004 by Reid

Business Data Communications And Networking 7e(pb)2003 by Dennis
Cbspss: Problems And Solutions Of Network And Systems (pb) 2010 by Jairath
Cbspss: Problems And Solutons In Network Analysis (pb) 2005 by Gopal
Ccna Cisco Certified Network Associate Security Study Guide With Cd Rom (exam 640-553) (pb)2009 by Deal
Ccna Guide To Cisco Networking Fundamentals, 4e (pb) 2008 by Cannon

SameCategoryBooks
  BOOKS OF THE SAME CATEGORY
Management Information Systems: Managerial Perspectives 4e (pb) 2014
Fundamentals Of Information Technology, 2e (pb) 2009
Fundamentals Of Cloud Computing (pb) 2018
Network Analysis 3e (pb)
Analysis And Design Of Algorithms: A Beginner''s Approach
Wireless Crash Course 2e(pb)2005
Dcom Networking With Visual J++ 6.0 (w/cd) (pb)2000
Handbook Of Local Area Networks (pb)2008
Oliver And Chapman''s Data Processing And Information Technology (pb)1996
Wireless Guide To Wireless Communications 2e(pb)2006
ALL BOOKS OF THE SAME CATEGORY
SameAuthorBooks
  BOOKS OF THE SAME AUTHOR (Last Name)
Isdn And Broadband Isdn With Frame Reley And Atm 4e(pb)1997
Operating Systems 4e(pb)2004
Operating Systems 2e(pb)2001
Snmp, Snmpv2 Snmpv3 And Rmon 1 And 2 3e (pb) 2005
Network Security Essential 4e(pb)2011
Data And Computer Communication 7e(pb)2004
Network Security Essentials Applications And Standards 4e(pb)2011
Operating Systems: Internals And Design Principles, 5e(pb)2008
Data And Computer Communication 7e(pb)2007
Cryptography And Network Security: Principles And Practices 4e(pb)2006
  ALL BOOKS OF THE SAME AUTHOR  
Session Order View Right Pane LeftCategory
COMPUTER SCIENCE
COMPUTER SCIENCE
. Computer Science
GENERAL REFERENCE
. Artificial Intelligence
. General Reference
. Numerical Methods / Discreate Mathematics
. Organization / Architecture
HARDWARE
. Certifications
. Communication
. Hardware
. Input And Output Devices
. Maintanance / Repairing
. Mis / It
. Networking / Distributed System
SOFTWARE
. Applications
. Certifications
. Computer Packages
. Data Structure
. Database
. E-commerce / E-marketing
. Engineering
. Internet
. Multimedia
. Operating System
. Programming / Language
. Software
. System Analysis And Designing
. Web Designing / Graphics
Untitled Document
PARAMOUNT'S MEDICAL
PARAMOUNT'S GENERAL
PARAMOUNT'S SOCIAL SCIENCE
PARAMOUNT'S CHILDREN
PARAMOUNT'S ENGINEERING
PARAMOUNT'S BUSINESS
Footer
Paramount Books (Pvt) Ltd.
Copyright © 2012-2019  
Facebook Paramount Books Twitter ParamountB
WhatsApp 0333-3821278
BRANCHES CUSTOMER SUPPORT QUICK LINKS
Abbotabad Site Map Quotation Request
Faisalabad FAQ / Help Refer to Friend
Hyderabad Contact Us How to Pay
Islamabad About Us Feedback
Karachi
Lahore
Peshawar    
  13855