Network Securities: Applications and Standards provides the following features to facilitate learning: UPDATED! The text includes the most recent innovations in a comprehensive coverage of the field. · UPDATED! Professors in the field have reviewed this book since the last edition to clarify and tighten the narrative and improve illustrations. · NEW! Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X. · NEW! Section on cloud security covers the security issues related to cloud computing. · NEW! Online chapter on SHA-3 discusses the new cryptographic hash standard, which was adopted in 2012. · NEW! Section on mobile device security introduces this essential aspect of enterprise network security. · UPDATED! Chapter on malicious software now focuses on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms.
· NEW! Sample Syllabi guide instructors in using the text for a limited amount of time. · NEW! Learning Objectives begin each chapter. The text is organized into three parts to help students better retain core subjects · Part I: Cryptography presents a concise survey of the cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, message authentication, and digital signatures. · Part II: Network Security Applications covers important network security tools and applications such as key distribution, Kerberos, X.509v3 certificates, Extensible Authentication Protocol, S/MIME, IP Security, SSL/TLS, IEEE 802.11i WiFi security, and cloud security. · Part III: System Security looks at system-level security issues including the threat of countermeasures for malicious software and intruders and the use of firewalls. ·.