Network and Application Security Fundamentals and Practices 1st Edition by Debashis Ganguly- Ebook PDF Instant Download/Delivery: 1578087554, 978-1578087556
Full download Network and Application Security Fundamentals and Practices 1st Edition after payment

Product details:
ISBN 10: 1578087554
ISBN 13: 978-1578087556
Author: Debashis Ganguly
To deal with security issues effectively, it is usually not sufficient to have knowledge of theories. Practical experience in dealing with these issues is essential. This book discusses the basic theories and also helps develop a practical outlook on the matter in a short and intriguing, manner. It provides readers with basic concepts and an awareness of industry standards and best practices. It answers questions such as “How do I know which cryptographic approach to be followed?”, “How do I set a firewall?”, “How do I secure specific network layers or application?”, “How do I fight against application level attacks?”, “How should I code securely?”
Table of contents:
NETWORK SECURITY — FUNDAMENTALS AND PRACTICES
1. Network Security Fundamentals
1.1. Security Triangle (Three Fundamental Objectives of Network Security)
– Confidentiality
– Integrity
– Availability
1.2. Security Threats
– Classification of Network Threats
– Confidentiality Attacks
– Integrity Attacks
– Availability Attacks
1.3. Understanding Security Measures
2. Cryptography and Network Security
2.1. Confidentiality with Symmetric Key Cryptography
– Data Encryption Standard (DES)
– Triple DES
– Advanced Encryption Standard (AES)
– Key Distribution and Confidentiality
2.2. Public Key Cryptography and Message Authentication
– Overview
– RSA Public-Key Encryption Algorithm
– Diffie–Hellman Key Exchange
– Elliptic Curve Architecture and Cryptography
– Key Management
3. System-level Security
3.1. Firewall
– Design Goals behind Firewalls
– Security Controls in Firewalls
– Design Limitations of Firewalls
– Firewall Types
– Firewall Configuration
3.2. Intrusion Detection and Intrusion Prevention Systems
– Overview
– Intrusion Detection Systems
– Intrusion Prevention Systems
4. Applications for Network Security
4.1. Kerberos — An Authentication Protocol
– Overview
– Implementation Mechanism
– Analysis
4.2. X.509 Authentication Service
4.3. Electronic Mail Security
– Overview
– Pretty Good Privacy (PGP)
4.4. IP Security
– Overview
– IPSec Architecture
– IPSec Implementation
– Security Association
– Authentication Header
– Encapsulating Security Payload (ESP)
– IPSec Operation Modes
– Key Management
4.5. Web Security
– Overview
– Web Security Threats
– Security Threat Modelling and Countermeasures
– Secure Socket Layer (SSL) and Transport Layer Security (TLS)
APPLICATION SECURITY — FUNDAMENTALS AND PRACTICES
5. Application Level Attacks
5.1. Occurrences
5.2. Consequences
5.3. Attack Types
5.4. SQL Injection
– Overview
– Consequences
– Remediation
5.5. Cross Site Scripting (XSS)
– Overview
– Consequences
– Remediation
5.6. XML-related Attacks
– XML Entity Attacks
– XML Injection
– XPATH Injection
– Remediation
5.7. Log Injection
– Overview
– Consequences
– Remediation
5.8. Path Manipulation
– Overview
– Consequences
– Remediation
5.9. HTTP Response Splitting
– Overview
– Consequences
– Remediation
5.10. LDAP Injection
– Overview
– Consequences
– Remediation
5.11. Command Injection
– Overview
– Consequences
– Remediation
5.12. Buffer Overflow
– Overview
– Consequences
– Remediation
5.13. Cross Site Request Forgery (CSRF)
– Overview
– Consequences
– Remediation
6. Practical Software Security — ASP.Net and Java
6.1. ASP.Net Security Guidelines
– Overview
– Code Access Security (CAS)
– Windows CardSpace
– MachineKey Configuration
– Authentication in .Net
– Restricting Configuration Override
6.2. Java Security Guidelines
– Java Security Model
– Specifying Security Constraints
7. Securing Application-specific Networks
7.1. Securing Storage Area Networks
– Overview
– Purpose of SAN
– SAN Design Components
– SAN Security Issues
– Security Measures for SAN
7.2. Securing VoIP-enabled Networks
– Overview
– Why VoIP?
– VoIP Design Components
– VoIP Security Issues
– Security Measures for VoIP
People also search for:
authentication application in network security and cryptography
difference between application security and network security
application security group and network security group
security at application layer in cryptography and network security
network security essentials applications and standards
Tags: Debashis Ganguly, Network and Application, Fundamentals and Practices


