Book description
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field’s leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.* Presents methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions.* Examples illustrate core security concepts for enhanced comprehension
Table of contents
- Copyright
- About the Authors
- 1. Network Security Overview
- 2. Network Attacks
- 3. Security and Privacy Architecture
- 4. Network Security Algorithms
- 5. Concepts in IP Security
- 6. IP Security in Practice
-
7. Security in Wireless Systems
- 7.1. Introduction
- 7.2. Security and Privacy Needs of a Wireless System
- 7.3. Required Features for a Secured Wireless Communications System
- 7.4. Methods of Providing Privacy and Security in Wireless Systems
- 7.5. Wireless Security and Standards
- 7.6. IEEE 802.11 Security
- 7.7. Security in North American Cellular/ PCS Systems
- 7.8. Security in GSM, GPRS, and UMTS
- 7.9. Data Security
- 7.10. Air Interface Support for Authentication Methods
- 7.11. Summary of Security in Current Wireless Systems
- 7.12. Conclusion
-
References
-
8. Mobile Security and Privacy
- 8.1. Security Primer
- 8.2. Cellular Network Security
- 8.3. Wireless LAN Security
- 8.4. Bluetooth Security
- 8.5. Ad Hoc Network Security
- 8.6. Mobile Privacy
- 8.7. Conclusion
- Further Reading
-
References
- 9. Optical Network Survivability
-
10. Intrusion Response Systems: A Survey
- 10.1. Introduction
- 10.2. Static Decision-Making Systems
- 10.3. Dynamic Decision-Making Systems
-
10.4. Intrusion Tolerance through Diverse Replicas
- 10.4.1. Broad Research Issues
- 10.4.2. Building Survivable Services Using Redundancy and Adaptation
- 10.4.3. Scalable Intrusion-Tolerant Architecture
- 10.4.4. Survival by Defense Enabling
- 10.4.5. Implementing Trustworthy Services Using Replicated State Machines
- 10.4.6. Distributing Trust on the Internet
- 10.5. Responses to Specific Kinds of Attacks
- 10.6. Benchmarking Intrusion Response Systems
- 10.7. Thoughts on Evolution of IRS Technology
- 10.8. Conclusion
-
References
Product information
- Title: Network Security: Know It All
- Author(s):
- Release date: July 2008
- Publisher(s): Morgan Kaufmann
- ISBN: 9780080560151
You might also like
book
Network Security First-Step, Second Edition
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world …
book
Network Security Fundamentals
An introduction to the key tools and technologies used to secure network access Examine common security …
book
LAN Switch Security: What Hackers Know About Your Switches
LAN Switch Security: What Hackers Know About Your Switches A practical guide to hardening Layer 2 …
book
Network Attacks and Defenses
Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to …