An edition of Network and internetwork security (1995)

Network and internetwork security

principles and practice

  • 4 Want to read
Locate

My Reading Lists:

Create a new list

  • 4 Want to read

Buy this book

Last edited by AgentSapphire
December 11, 2023 | History
An edition of Network and internetwork security (1995)

Network and internetwork security

principles and practice

  • 4 Want to read

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems.

The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students.

  1. Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed.

Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, is covered.

In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.

Publish Date
Language
English
Pages
462

Buy this book

Edition Availability
Cover of: Network and internetwork security
Network and internetwork security: principles and practice
1995, Prentice-Hall, IEEE Press
in English
Cover of: Network and internetwork security
Network and internetwork security: principles and practice
1995, Prentice Hall, IEEE
in English

Add another edition?

Book Details


Edition Notes

Includes bibliography and index.

Published in
Englewood Cliffs, N.J, New York
Series
Prentice-Hall international editions

Classifications

Dewey Decimal Class
005.8

The Physical Object

Pagination
xiii,462p. :
Number of pages
462

Edition Identifiers

Open Library
OL19344327M
ISBN 10
0131800507
LibraryThing
2670903
Goodreads
5300138

Work Identifiers

Work ID
OL1865005W

Community Reviews (0)

No community reviews have been submitted for this work.

Lists

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
December 11, 2023 Edited by AgentSapphire undo merge authors
June 15, 2013 Edited by Ben Companjen merge authors
August 18, 2010 Edited by IdentifierBot added LibraryThing ID
April 16, 2010 Edited by bgimpertBot Added goodreads ID.
October 21, 2008 Created by ImportBot Imported from Talis record