ACKNOWLEDGEMENTS generate, create qr code none in .net projects Microsoft Excel This new e qr bidimensional barcode for .NET dition has benefited from review by a number of people who gave generously their time and expertise. The following people reviewed all or a large part of the manuscript: Marius Zimand (Towson State University), Shambhu Upadhyaya (University of Buffalo), Nan Zhang (George Washington University), Dongwan Shin (New Mexico Tech), Michael Kain (Drexel University), William Bard (University of Texas), David Arnold (Baylor University), Edward Allen (Wake Forest University), Michael Goodrich (UC-Irvine), Xunhua Wang (James Madison University), Xianyang Li (Illinois Institute of Technology), and Paul Jenkins (Brigham Young University).

Thanks also to the many people who provided detailed technical reviews of one or more chapters: Martin Bealby, Martin Hlavac (Department of Algebra, Charles University in Prague, Czech Republic), Martin Rublik (BSP Consulting and University of Economics in Bratislava), Rafael Lara (President of Venezuela s Association for Information Security and Cryptography Research), Amitabh Saxena, and Michael Spratte (Hewlett-Packard Company). I would especially like to thank Nikhil Bhargava (IIT Delhi) for providing detailed reviews of various chapters of the book. Nikhil Bhargava (IIT Delhi) developed the set of online homework problems and solutions.

Professor Sreekanth Malladi of Dakota State University developed the hacking exercises. Sanjay Rao and Ruben Torres of Purdue developed the laboratory exercises that appear in the IRC. The following people contributed project assignments that appear in the instructor s supplement: Henning Schulzrinne (Columbia University), Cetin Kaya Koc (Oregon State University), and David Balenson (Trusted Information Systems and George Washington University).

Kim McLaughlin developed the test bank. Finally, I would like to thank the many people responsible for the publication of the book, all of whom did their usual excellent job. This includes my editor Tracy Dunkelberger and her assistants Melinda Hagerty and Allison Michael.

Also, Jake Warde of Warde Publishers managed the reviews. With all this assistance, little remains for which I can take full credit. However, I am proud to say that, with no help whatsoever, I selected all of the quotations.

. ABOUT THE AUTHOR William St QR Code ISO/IEC18004 for .NET allings has made a unique contribution to understanding the broad sweep of technical developments in computer security, computer networking, and computer architecture. He has authored 17 titles and, counting revised editions, a total of 42 books on various aspects of these subjects.

His writings have appeared in numerous ACM and IEEE publications, including the Proceedings of the IEEE and ACM Computing Reviews. He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms.

He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products. He created and maintains the Computer Science Student Resource Site at WilliamStallings .

com/StudentSupport.html. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals).

He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from M.

I.T. in Computer Science and a B.

S. from Notre Dame in electrical engineering..

CHAPTER INTRODUCTION 1.1 Comput er Security Concepts A Definition of Computer Security Examples The Challenges of Computer Security 1.2 1.

3 The OSI Security Architecture Security Attacks Passive Attacks Active Attacks 1.4 Security Services Authentication Access Control Data Confidentiality Data Integrity Nonrepudiation Availability Service 1.5 1.

6 1.7 1.8 1.

9 Security Mechanisms A Model for Network Security Standards Outline of This Book Recommended Reading. 1.10 Inter Visual Studio .NET Quick Response Code net and Web Resources Web Sites for This Book Other Web Sites USENET Newsgroups 1.

11 Key Terms, Review Questions, and Problems.
Copyright © . All rights reserved.