You are previewing Introduction to Network Security, 2nd Edition.
O'Reilly logo
Introduction to Network Security, 2nd Edition

Book Description

Introductory textbook in the important area of network security for undergraduate and graduate students

  • Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security
  • Fully updated to reflect new developments in network security
  • Introduces a chapter on Cloud security, a very popular and essential topic
  • Uses everyday examples that most computer users experience to illustrate important principles and mechanisms
  • Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Preface
  5. About the Author
  6. Chapter 1: Network Security Overview
    1. 1.1 Mission and Definitions
    2. 1.2 Common Attacks and Defense Mechanisms
    3. 1.3 Attacker Profiles
    4. 1.4 Basic Security Model
    5. 1.5 Security Resources
    6. 1.6 Closing Remarks
    7. 1.7 Exercises
  7. Chapter 2: Data Encryption Algorithms
    1. 2.1 Data Encryption Algorithm Design Criteria
    2. 2.2 Data Encryption Standard
    3. 2.3 Multiple DES
    4. 2.4 Advanced Encryption Standard
    5. 2.5 Standard Block Cipher Modes of Operations
    6. 2.6 Offset Codebook Mode of Operations
    7. 2.7 Stream Ciphers
    8. 2.8 Key Generations
    9. 2.9 Closing Remarks
    10. 2.10 Exercises
  8. Chapter 3: Public-Key Cryptography and Key Management
    1. 3.1 Concepts of Public-Key Cryptography
    2. 3.2 Elementary Concepts and Theorems in Number Theory
    3. 3.3 Diffie-Hellman Key Exchange
    4. 3.4 RSA Cryptosystem
    5. 3.5 Elliptic-Curve Cryptography
    6. 3.6 Key Distributions and Management
    7. 3.7 Closing Remarks
    8. 3.8 Exercises
  9. Chapter 4: Data Authentication
    1. 4.1 Cryptographic Hash Functions
    2. 4.2 Cryptographic Checksums
    3. 4.3 HMAC
    4. 4.4 Birthday Attacks
    5. 4.5 Digital Signature Standard
    6. 4.6 Dual Signatures and Electronic Transactions
    7. 4.7 Blind Signatures and Electronic Cash
    8. 4.8 Closing Remarks
    9. 4.9 Exercises
  10. Chapter 5: Network Security Protocols in Practice
    1. 5.1 Crypto Placements in Networks
    2. 5.2 Public-Key Infrastructure
    3. 5.3 IPsec: A Security Protocol at the Network Layer
    4. 5.4 SSL/TLS: Security Protocols at the Transport Layer
    5. 5.5 PGP and S/MIME: Email Security Protocols
    6. 5.6 Kerberos: An Authentication Protocol
    7. 5.7 SSH: Security Protocols for Remote Logins
    8. 5.8 Electronic Voting Protocols
    9. 5.9 Closing Remarks
    10. 5.10 Exercises
  11. Chapter 6: Wireless Network Security
    1. 6.1 Wireless Communications and 802.11 WLAN Standards
    2. 6.2 Wired Equivalent Privacy
    3. 6.3 Wi-Fi Protected Access
    4. 6.4 IEEE 802.11i/WPA2
    5. 6.5 Bluetooth Security
    6. 6.6 ZigBee Security
    7. 6.7 Wireless Mesh Network Security
    8. 6.8 Closing Remarks
    9. 6.9 Exercises
  12. Chapter 7: Cloud Security
    1. 7.1 The Cloud Service Models
    2. 7.2 Cloud Security Models
    3. 7.3 Multiple Tenancy
    4. 7.4 Access Control
    5. 7.5 Coping with Untrusted Clouds
    6. 7.6 Searchable Encryption<img xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0" src="images/c07-math-0204.png" alt="c07-math-0204" style="vertical-align:middle;"></img>
    7. 7.7 Closing Remarks
    8. 7.8 Exercises
  13. Chapter 8: Network Perimeter Security
    1. 8.1 General Firewall Framework
    2. 8.2 Packet Filters
    3. 8.3 Circuit Gateways
    4. 8.4 Application Gateways
    5. 8.5 Trusted Systems and Bastion Hosts
    6. 8.6 Firewall Configurations
    7. 8.7 Network Address Translations
    8. 8.8 Setting Up Firewalls
    9. 8.9 Closing Remarks
    10. 8.10 Exercises
  14. Chapter 9: Intrusion Detections
    1. 9.1 Basic Ideas of Intrusion Detection
    2. 9.2 Network-Based Detections and Host-Based Detections
    3. 9.3 Signature Detections
    4. 9.4 Statistical Analysis
    5. 9.5 Behavioral Data Forensics
    6. 9.6 Honeypots
    7. 9.7 Closing Remarks
    8. 9.8 Exercises
  15. Chapter 10: The Art of Anti-Malicious Software
    1. 10.1 Viruses
    2. 10.2 Worms
    3. 10.3 Trojans
    4. 10.4 Malware Defense
    5. 10.5 Hoaxes
    6. 10.6 Peer-to-Peer Security
    7. 10.7 Web Security
    8. 10.8 Distributed Denial-of-Service Attacks
    9. 10.9 Closing Remarks
    10. 10.10 Exercises
  16. Appendix A. 7-bit ASCII code
  17. Appendix B. SHA-512 Constants (in Hexadecimal)
  18. Appendix C. Data Compression Using ZIP
    1. Exercise
  19. Appendix D. Base64 Encoding
    1. Exercise
  20. Appendix E. Cracking WEP Keys Using WEPCrack
    1. E.1 System Setup
    2. E.2 Experiment Details
    3. E.3 Sample Code
  21. Appendix F. Acronyms
  22. Further Readings
  23. Index
  24. End User License Agreement