An edition of Network and internetwork security (1995)

Network and internetwork security

principles and practice

  • 0 Ratings
  • 4 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 4 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by MARC Bot
July 15, 2024 | History
An edition of Network and internetwork security (1995)

Network and internetwork security

principles and practice

  • 0 Ratings
  • 4 Want to read
  • 0 Currently reading
  • 0 Have read

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems.

The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students.

  1. Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed.

Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, is covered.

In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.

Publish Date
Publisher
Prentice Hall, IEEE
Language
English
Pages
462

Buy this book

Edition Availability
Cover of: Network and internetwork security
Network and internetwork security: principles and practice
1995, Prentice-Hall, IEEE Press
in English
Cover of: Network and internetwork security
Network and internetwork security: principles and practice
1995, Prentice Hall, IEEE
in English

Add another edition?

Book Details


Edition Notes

Includes bibliographical references (p. 449-456) and index.

Published in
Englewood Cliffs, N.J, New York

Classifications

Dewey Decimal Class
005.8
Library of Congress
TK5105.5 .S728 1995

The Physical Object

Pagination
xiii, 462 p. :
Number of pages
462

ID Numbers

Open Library
OL1082411M
ISBN 10
0024154830
LCCN
94006003
OCLC/WorldCat
29911702
Library Thing
2670903
Goodreads
806255

Source records

marc_columbia MARC record

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
July 15, 2024 Edited by MARC Bot import existing book
December 11, 2023 Edited by AgentSapphire undo merge authors
November 18, 2018 Edited by ImportBot import existing book
June 15, 2013 Edited by Ben Companjen merge authors
December 9, 2009 Created by WorkBot add works page