Network security essentials : applications and standards / by william Stallings

By: Stallings, WilliamMaterial type: TextTextPublication details: New Delhi : Pearson Educations Publications, 2011cEdition: 4th edDescription: xiii, 417 p. ; ill. 25 cmISBN: 9788131761755 (pbk)Subject(s): LAN(Computer Network)DDC classification: 004.6
Contents:
Chapter 1: Introduction----------------------------- Chapter 2: Symmetric Encryption and message confidentiality--------------------------- Chapter 3: Public-Key Cryptography and Message Authentication---------------------- Chapter 4: Key Distribution and User Authentication---------------------------- Chapter 5: Transport-Level Security--------------------------- Chapter 6: Wireless Network Security---------------------------- Chapter 7: Electronic Mail Security----------------------------- Chapter 8: IP Security------------------------------ Chapter 9: Intruders-------------------------- Chapter 10: Malicious Software---------------------------- Chapter 11: Firewalls----------------------------
List(s) this item appears in: CS titles
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
004.6 STA-N 2011 990 (Browse shelf (Opens below)) Available 990
Books Books Namal Library
Computer Science
004.6 STA-N 2011 551 (Browse shelf (Opens below)) Available 551
Total holds: 0
Browsing Namal Library shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
004.6 STA-I 1989 5950 ISDN : 004.6 STA-N 2011 551 Network security essentials : applications and standards / 004.6 STA-N 2011 1545 Network security essentials : 004.6 STA-N 2011 990 Network security essentials : applications and standards / 004.6 SUB-N 2011 10049 Network management : 004.6 TAN-C 1981 1965 Computer networks / 004.6 TAN-C 1995 9759 Computer networks /

Index included

Chapter 1: Introduction-----------------------------
Chapter 2: Symmetric Encryption and message confidentiality---------------------------
Chapter 3: Public-Key Cryptography and Message Authentication----------------------
Chapter 4: Key Distribution and User Authentication----------------------------
Chapter 5: Transport-Level Security---------------------------
Chapter 6: Wireless Network Security----------------------------
Chapter 7: Electronic Mail Security-----------------------------
Chapter 8: IP Security------------------------------
Chapter 9: Intruders--------------------------
Chapter 10: Malicious Software----------------------------
Chapter 11: Firewalls----------------------------

There are no comments on this title.

to post a comment.