ORPP logo

Network Security. (Record no. 41384)

MARC details
000 -LEADER
fixed length control field 07540nam a22004813i 4500
001 - CONTROL NUMBER
control field EBC1800888
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729123105.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2014 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119043966
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781848217584
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC1800888
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL1800888
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10945002
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL647917
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)894170274
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59 -- .P47 2014eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pérez, André.
245 10 - TITLE STATEMENT
Title Network Security.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Newark :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Incorporated,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (310 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover Page -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Preface -- Abbreviations -- 1: Introduction to Cryptography -- 1.1. The encryption function -- 1.1.1. 3DES algorithm -- 1.1.2. AES algorithm -- 1.1.3. RSA algorithm -- 1.1.4. ECC algorithm -- 1.2. Hash function -- 1.2.1. MD5 algorithm -- 1.2.2. SHA algorithm -- 1.2.2.1. SHA-1 algorithm -- 1.2.2.2. SHA-2 algorithm -- 1.2.3. HMAC mechanism -- 1.3. Key exchange -- 1.3.1. Secret-key generation -- 1.3.2. Public key distribution -- 2: 802.1x Mechanism -- 2.1. General introduction -- 2.2. EAPOL protocol -- 2.2.1. EAPOL-Start message -- 2.2.2. EAPOL-Logoff message -- 2.2.3. EAPOL-Key message -- 2.2.4. EAPOL-Encapsulated-ASF-Alert message -- 2.2.5. EAPOL-MKA message -- 2.2.6. EAPOL-Announcement message -- 2.2.7. EAPOL-Announcement-Req message -- 2.3. EAP protocol -- 2.3.1. EAP-Method Identity -- 2.3.2. EAP-Method Notification -- 2.3.3. EAP-Method NAK -- 2.4. RADIUS protocol -- 2.4.1. RADIUS messages -- 2.4.1.1. Access-Request message -- 2.4.1.2. Access-Challenge message -- 2.4.1.3. Access-Accept message -- 2.4.1.4. Access-Reject message -- 2.4.2. RADIUS attributes -- 2.4.2.1. EAP-Message attribute -- 2.4.2.2. Message-Authenticator attribute -- 2.4.2.3. Password-Retry attribute -- 2.4.2.4. User-Name attribute -- 2.4.2.5. User-Password attribute -- 2.4.2.6. NAS-IP-Address attribute -- 2.4.2.7. NAS-Port attribute -- 2.4.2.8. Service-Type attribute -- 2.4.2.9. Vendor-Specific attribute -- 2.4.2.10. Session-Timeout attribute -- 2.4.2.11. Idle-Timeout attribute -- 2.4.2.12. Termination-Action attribute -- 2.5. Authentication procedures -- 2.5.1. EAP-MD5 procedure -- 2.5.2. EAP-TLS procedure -- 2.5.3. EAP-TTLS procedure -- 3: WPA Mechanisms -- 3.1. Introduction to Wi-Fi technology -- 3.2. Security mechanisms -- 3.3. Security policies -- 3.4. Key management -- 3.4.1. Key hierarchy.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.4.2. EAPOL-key messages -- 3.4.3. Four-way handshake procedure -- 3.4.4. Group key handshake procedure -- 3.5. WEP protocol -- 3.6. TKIP protocol -- 3.7. CCMP protocol -- 4: IPSec Mechanism -- 4.1. Review of IP protocols -- 4.1.1. IPv4 protocol -- 4.1.2. IPv6 protocol -- 4.2. IPSec architecture -- 4.2.1. Security headers -- 4.2.1.1. AH extension -- 4.2.1.2. ESP extension -- 4.2.1.3. Modes -- 4.2.2. Security association -- 4.2.3. PMTU processing -- 4.3. IKEv2 protocol -- 4.3.1. Message header -- 4.3.2. Blocks -- 4.3.2.1. SA block -- 4.3.2.2. KE block -- 4.3.2.3. IDi and IDr blocks -- 4.3.2.4. CERT block -- 4.3.2.5. CERTREQ block -- 4.3.2.6. The AUTH block -- 4.3.2.7. Ni and Nr blocks -- 4.3.2.8. N block -- 4.3.2.9. D block -- 4.3.2.10. V block -- 4.3.2.11. TS block -- 4.3.2.12. SK block -- 4.3.2.13. CP block -- 4.3.2.14. EAP block -- 4.3.3. Procedure -- 4.3.3.1. IKE_SA_INIT exchange -- 4.3.3.2. IKE_AUTH exchange -- 4.3.3.3. CREATE_CHILD_SA exchange -- 5: SSL, TLS and DTLS Protocols -- 5.1. Introduction -- 5.2. SSL/TLS protocols -- 5.2.1. Record header -- 5.2.2. Change_cipher_spec message -- 5.2.3. Alert message -- 5.2.4. Handshake messages -- 5.2.4.1. Hello_request message -- 5.2.4.2. Client_hello message -- 5.2.4.3. Hello_server message -- 5.2.4.4. Certificate message -- 5.2.4.5. Server_key_exchange message -- 5.2.4.6. Certificate_request message -- 5.2.4.7. Server_hello_done message -- 5.2.4.8. Client_key_exchange message -- 5.2.4.9. Certificate_verify message -- 5.2.4.10. Finished message -- 5.2.5. Cryptographic information -- 5.2.5.1. Key generation -- 5.2.5.2. Integrity checking -- 5.3. DTLS protocol -- 5.3.1. Adaptation to UDP transport -- 5.3.1.1. Record header -- 5.3.1.2. Handshake messages -- 5.3.2. Adaptation to DCCP transport -- 5.3.3. Adaption to SCTP transport -- 5.3.4. Adaption to SRTP transport -- 6: Network Management.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.1. SNMPv3 management -- 6.1.1. Introduction -- 6.1.2. SNMPv3 architecture -- 6.1.2.1. SNMPv3 applications -- 6.1.2.2. SNMPv3 engine -- 6.1.2.2.1. USM module -- 6.1.2.2.2. VACM module -- 6.1.2.3. Operation procedures -- 6.1.3. SNMPv3 message structure -- 6.2. SSH protocol -- 6.2.1. SSH-TRANS protocol -- 6.2.2. SSH-USERAUTH protocol -- 6.2.3. SSH-CONNECT protocol -- 7: MPLS Technology -- 7.1. MPLS overview -- 7.1.1. Network architecture -- 7.1.2. LSR router tables -- 7.1.3. PHP function -- 7.1.4. MPLS header format -- 7.1.5. DiffServ support -- 7.2. LDP protocol -- 7.2.1. Principles of functioning -- 7.2.2. LDP PDU format -- 7.2.3. LDP messages -- 7.3. VPN construction -- 7.3.1. Network architecture -- 7.3.2. Differentiation of routes -- 7.3.3. Route target -- 7.3.4. Principles of operation -- 7.3.4.1. Operation of control plane -- 7.3.4.2. Operation of traffic plane -- 7.4. Network interconnection -- 7.4.1. Hierarchical mode -- 7.4.2. Recursive mode -- 8: Ethernet VPN -- 8.1. Ethernet technology -- 8.1.1. Physical layer -- 8.1.2. MAC layer -- 8.1.3. VLAN isolation -- 8.2. PBT technology -- 8.3. VPLS technology -- 8.3.1. Network architecture -- 8.3.2. EoMPLS header -- 8.3.3. LDP -- 8.3.3.1. FEC parameter -- 8.3.3.2. PW status parameter -- 8.4. L2TPv3 technology -- 8.4.1. Data message -- 8.4.2. Control messages -- 8.4.3. Procedures -- 8.4.3.1. Connection management -- 8.4.3.2. Session management -- 9: Firewalls -- 9.1. Technologies -- 9.1.1. Packet filter -- 9.1.2. Applicative gateway -- 9.1.3. NAT/NAPT device -- 9.2. NAT/NAPT device crossing -- 9.2.1. ICMP protocol -- 9.2.2. IPSec mechanism -- 9.2.3. SIP, SDP and RTP protocols -- 9.2.3.1. STUN protocol -- 9.2.3.2. TURN protocol -- 9.2.3.3. ICE mechanism -- 9.2.4. FTP protocol -- 9.2.5. Fragmentation -- 10: Intrusion Detection -- 10.1. Typology of attacks -- 10.2. Methods of detection.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 10.2.1. Signature-based detection -- 10.2.2. Anomaly-based detection -- 10.2.3. Protocol analysis -- 10.3. Technologies -- 10.3.1. N-IDPS device -- 10.3.2. WIDPS device -- 10.3.3. H-IDPS device -- 10.3.4. NBA device -- Bibliography -- Index.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks -- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers -- Security.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Pérez, André
Title Network Security
Place, publisher, and date of publication Newark : John Wiley & Sons, Incorporated,c2014
International Standard Book Number 9781848217584
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1800888">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1800888</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.