fourth edition. 296 pages. 9.40x0.60x7.20 inches. In Stock. Bookseller Inventory # 9350380188
Synopsis: Introduction Need of security, Attributes of security, Authentication, Access control, Confidentiality, Authorization, Integrity, Non-reproduction and cryptography, Vulnerabilities in OSI model, Layers, Types of attacks, DOS, IP spoofing, Man-in-the-middle, Attack , Replay, DNS poisoning, Information security lifecycle, Multilevel model of security, Worms, Viruses, Trojans, One time passwords, Single sign on, Use of Bioinformatics in security. Public Key Cryptography Principles, RSA, ECC, DSA, Key management, Kerberos, Elliptical curve cryptography, X.509, Diffie-helleman, Key exchange, Attacks, Message authentication and hash functions, Hash algorithms, Digital signatures. Secret Key Cryptography DES, Triple DES, AES, IDEA, Key distribution, Attacks. Virtual Private Network Need, Types of VPN, VPN supported systems, Tunneling and tunneling protocols, PPTP, L2TP, IPSec protocol suite, IKE, ESP, AH. Network Periphery Security Router and security, Firewalls, Packet filters, DMZ, Application level gateways, IPS, Types, OS hardening, VLAN, Wireless LAN, WEP, Honey pot. Web and E-mail Security Security services, Web security considerations, SSL and TLS, SET, PEM and S/MIME, PGP smart cards, Application security using smart cards. Kerberos, Electronic commerce attacks, Micro payments, Unsmart cards, E-cache.
Title: NETWORKS AND INFORMATION SECURITY
Publisher: Technical Publications
Publication Date: 2011
Book Condition: Brand New
Book Description Technical Publications, 2011. Condition: New. book. Seller Inventory # M9350380188