Network Security. (Record no. 41384)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07540nam a22004813i 4500 |
001 - CONTROL NUMBER | |
control field | EBC1800888 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729123105.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2014 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119043966 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781848217584 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC1800888 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL1800888 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr10945002 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL647917 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)894170274 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 -- .P47 2014eb |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pérez, André. |
245 10 - TITLE STATEMENT | |
Title | Network Security. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Newark : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Incorporated, |
Date of production, publication, distribution, manufacture, or copyright notice | 2014. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2014. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (310 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover Page -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Preface -- Abbreviations -- 1: Introduction to Cryptography -- 1.1. The encryption function -- 1.1.1. 3DES algorithm -- 1.1.2. AES algorithm -- 1.1.3. RSA algorithm -- 1.1.4. ECC algorithm -- 1.2. Hash function -- 1.2.1. MD5 algorithm -- 1.2.2. SHA algorithm -- 1.2.2.1. SHA-1 algorithm -- 1.2.2.2. SHA-2 algorithm -- 1.2.3. HMAC mechanism -- 1.3. Key exchange -- 1.3.1. Secret-key generation -- 1.3.2. Public key distribution -- 2: 802.1x Mechanism -- 2.1. General introduction -- 2.2. EAPOL protocol -- 2.2.1. EAPOL-Start message -- 2.2.2. EAPOL-Logoff message -- 2.2.3. EAPOL-Key message -- 2.2.4. EAPOL-Encapsulated-ASF-Alert message -- 2.2.5. EAPOL-MKA message -- 2.2.6. EAPOL-Announcement message -- 2.2.7. EAPOL-Announcement-Req message -- 2.3. EAP protocol -- 2.3.1. EAP-Method Identity -- 2.3.2. EAP-Method Notification -- 2.3.3. EAP-Method NAK -- 2.4. RADIUS protocol -- 2.4.1. RADIUS messages -- 2.4.1.1. Access-Request message -- 2.4.1.2. Access-Challenge message -- 2.4.1.3. Access-Accept message -- 2.4.1.4. Access-Reject message -- 2.4.2. RADIUS attributes -- 2.4.2.1. EAP-Message attribute -- 2.4.2.2. Message-Authenticator attribute -- 2.4.2.3. Password-Retry attribute -- 2.4.2.4. User-Name attribute -- 2.4.2.5. User-Password attribute -- 2.4.2.6. NAS-IP-Address attribute -- 2.4.2.7. NAS-Port attribute -- 2.4.2.8. Service-Type attribute -- 2.4.2.9. Vendor-Specific attribute -- 2.4.2.10. Session-Timeout attribute -- 2.4.2.11. Idle-Timeout attribute -- 2.4.2.12. Termination-Action attribute -- 2.5. Authentication procedures -- 2.5.1. EAP-MD5 procedure -- 2.5.2. EAP-TLS procedure -- 2.5.3. EAP-TTLS procedure -- 3: WPA Mechanisms -- 3.1. Introduction to Wi-Fi technology -- 3.2. Security mechanisms -- 3.3. Security policies -- 3.4. Key management -- 3.4.1. Key hierarchy. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.4.2. EAPOL-key messages -- 3.4.3. Four-way handshake procedure -- 3.4.4. Group key handshake procedure -- 3.5. WEP protocol -- 3.6. TKIP protocol -- 3.7. CCMP protocol -- 4: IPSec Mechanism -- 4.1. Review of IP protocols -- 4.1.1. IPv4 protocol -- 4.1.2. IPv6 protocol -- 4.2. IPSec architecture -- 4.2.1. Security headers -- 4.2.1.1. AH extension -- 4.2.1.2. ESP extension -- 4.2.1.3. Modes -- 4.2.2. Security association -- 4.2.3. PMTU processing -- 4.3. IKEv2 protocol -- 4.3.1. Message header -- 4.3.2. Blocks -- 4.3.2.1. SA block -- 4.3.2.2. KE block -- 4.3.2.3. IDi and IDr blocks -- 4.3.2.4. CERT block -- 4.3.2.5. CERTREQ block -- 4.3.2.6. The AUTH block -- 4.3.2.7. Ni and Nr blocks -- 4.3.2.8. N block -- 4.3.2.9. D block -- 4.3.2.10. V block -- 4.3.2.11. TS block -- 4.3.2.12. SK block -- 4.3.2.13. CP block -- 4.3.2.14. EAP block -- 4.3.3. Procedure -- 4.3.3.1. IKE_SA_INIT exchange -- 4.3.3.2. IKE_AUTH exchange -- 4.3.3.3. CREATE_CHILD_SA exchange -- 5: SSL, TLS and DTLS Protocols -- 5.1. Introduction -- 5.2. SSL/TLS protocols -- 5.2.1. Record header -- 5.2.2. Change_cipher_spec message -- 5.2.3. Alert message -- 5.2.4. Handshake messages -- 5.2.4.1. Hello_request message -- 5.2.4.2. Client_hello message -- 5.2.4.3. Hello_server message -- 5.2.4.4. Certificate message -- 5.2.4.5. Server_key_exchange message -- 5.2.4.6. Certificate_request message -- 5.2.4.7. Server_hello_done message -- 5.2.4.8. Client_key_exchange message -- 5.2.4.9. Certificate_verify message -- 5.2.4.10. Finished message -- 5.2.5. Cryptographic information -- 5.2.5.1. Key generation -- 5.2.5.2. Integrity checking -- 5.3. DTLS protocol -- 5.3.1. Adaptation to UDP transport -- 5.3.1.1. Record header -- 5.3.1.2. Handshake messages -- 5.3.2. Adaptation to DCCP transport -- 5.3.3. Adaption to SCTP transport -- 5.3.4. Adaption to SRTP transport -- 6: Network Management. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.1. SNMPv3 management -- 6.1.1. Introduction -- 6.1.2. SNMPv3 architecture -- 6.1.2.1. SNMPv3 applications -- 6.1.2.2. SNMPv3 engine -- 6.1.2.2.1. USM module -- 6.1.2.2.2. VACM module -- 6.1.2.3. Operation procedures -- 6.1.3. SNMPv3 message structure -- 6.2. SSH protocol -- 6.2.1. SSH-TRANS protocol -- 6.2.2. SSH-USERAUTH protocol -- 6.2.3. SSH-CONNECT protocol -- 7: MPLS Technology -- 7.1. MPLS overview -- 7.1.1. Network architecture -- 7.1.2. LSR router tables -- 7.1.3. PHP function -- 7.1.4. MPLS header format -- 7.1.5. DiffServ support -- 7.2. LDP protocol -- 7.2.1. Principles of functioning -- 7.2.2. LDP PDU format -- 7.2.3. LDP messages -- 7.3. VPN construction -- 7.3.1. Network architecture -- 7.3.2. Differentiation of routes -- 7.3.3. Route target -- 7.3.4. Principles of operation -- 7.3.4.1. Operation of control plane -- 7.3.4.2. Operation of traffic plane -- 7.4. Network interconnection -- 7.4.1. Hierarchical mode -- 7.4.2. Recursive mode -- 8: Ethernet VPN -- 8.1. Ethernet technology -- 8.1.1. Physical layer -- 8.1.2. MAC layer -- 8.1.3. VLAN isolation -- 8.2. PBT technology -- 8.3. VPLS technology -- 8.3.1. Network architecture -- 8.3.2. EoMPLS header -- 8.3.3. LDP -- 8.3.3.1. FEC parameter -- 8.3.3.2. PW status parameter -- 8.4. L2TPv3 technology -- 8.4.1. Data message -- 8.4.2. Control messages -- 8.4.3. Procedures -- 8.4.3.1. Connection management -- 8.4.3.2. Session management -- 9: Firewalls -- 9.1. Technologies -- 9.1.1. Packet filter -- 9.1.2. Applicative gateway -- 9.1.3. NAT/NAPT device -- 9.2. NAT/NAPT device crossing -- 9.2.1. ICMP protocol -- 9.2.2. IPSec mechanism -- 9.2.3. SIP, SDP and RTP protocols -- 9.2.3.1. STUN protocol -- 9.2.3.2. TURN protocol -- 9.2.3.3. ICE mechanism -- 9.2.4. FTP protocol -- 9.2.5. Fragmentation -- 10: Intrusion Detection -- 10.1. Typology of attacks -- 10.2. Methods of detection. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 10.2.1. Signature-based detection -- 10.2.2. Anomaly-based detection -- 10.2.3. Protocol analysis -- 10.3. Technologies -- 10.3.1. N-IDPS device -- 10.3.2. WIDPS device -- 10.3.3. H-IDPS device -- 10.3.4. NBA device -- Bibliography -- Index. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks -- Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers -- Security. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Pérez, André |
Title | Network Security |
Place, publisher, and date of publication | Newark : John Wiley & Sons, Incorporated,c2014 |
International Standard Book Number | 9781848217584 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1800888">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1800888</a> |
Public note | Click to View |
No items available.