Network security essentials : applications and standards / by william Stallings

By: Stallings, WilliamMaterial type: TextTextPublication details: New Delhi : Pearson Educations Publications, 2011cEdition: 4th edDescription: xiii, 417 p. ; ill. 25 cmISBN: 9788131761755 (pbk)Subject(s): LAN(Computer Network)DDC classification: 004.6
Contents:
Chapter 1: Introduction----------------------------- Chapter 2: Symmetric Encryption and message confidentiality--------------------------- Chapter 3: Public-Key Cryptography and Message Authentication---------------------- Chapter 4: Key Distribution and User Authentication---------------------------- Chapter 5: Transport-Level Security--------------------------- Chapter 6: Wireless Network Security---------------------------- Chapter 7: Electronic Mail Security----------------------------- Chapter 8: IP Security------------------------------ Chapter 9: Intruders-------------------------- Chapter 10: Malicious Software---------------------------- Chapter 11: Firewalls----------------------------
List(s) this item appears in: CS titles
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
004.6 STA-N 2011 990 (Browse shelf (Opens below)) Available 990
Books Books Namal Library
Computer Science
004.6 STA-N 2011 551 (Browse shelf (Opens below)) Available 551
Total holds: 0

Index included

Chapter 1: Introduction-----------------------------
Chapter 2: Symmetric Encryption and message confidentiality---------------------------
Chapter 3: Public-Key Cryptography and Message Authentication----------------------
Chapter 4: Key Distribution and User Authentication----------------------------
Chapter 5: Transport-Level Security---------------------------
Chapter 6: Wireless Network Security----------------------------
Chapter 7: Electronic Mail Security-----------------------------
Chapter 8: IP Security------------------------------
Chapter 9: Intruders--------------------------
Chapter 10: Malicious Software----------------------------
Chapter 11: Firewalls----------------------------

There are no comments on this title.

to post a comment.