Network Security: A Systems Approach — Network Security: A Systems Approach Version 1.1-dev documentation
Network Security: A Systems Approach
View page source
Next
Network Security: A Systems Approach
Peterson and Davie
Table of Contents
Foreword
Preface<br>Acknowledgements
Chapter 1. Introduction<br>1.1 A Short History of Internet Security
1.2 Threats and Trust
1.3 Threats to Network Security
Chapter 2. Design Principles<br>2.1 Security Requirements
2.2 Broader System Requirements
2.3 Principles for Secure Systems
2.4 Best Practices
2.5 Summary
Chapter 3. Cryptographic Primitives<br>3.1 Principles of Ciphers
3.2 Secret-Key Ciphers
3.3 Public-Key Ciphers
3.4 Message Authentication
Chapter 4. Key Distribution<br>4.1 Predistribution of Public Keys
4.2 Distribution of Secret Keys
4.3 Diffie-Hellman Key Exchange
Chapter 5. Authentication Protocols<br>5.1 Freshness and Timeliness Techniques
5.2 Public-Key Authentication Protocols
5.3 Secret-Key Authentication Protocols
Chapter 6. Transport Security<br>6.1 Handshake Protocol
6.2 Record Protocol
6.3 Session Resumption and Zero RTT Operation
6.4 QUIC, HTTP/3 and TLS
6.5 A Systems View of TLS
Chapter 7. Subsystem Security<br>7.1 Pretty Good Privacy
7.2 Secure Shell
7.3 IP Security
7.4 Virtual Private Networks
7.5 Web Authentication and Passkeys
7.6 Wireless Security
Chapter 8. Infrastructure Security<br>8.1 BGP and Routing Security
8.2 DNS and Naming Security
8.3 DoS Mitigation
Chapter 9. Firewalls<br>9.1 Basic Principles of Firewalls
9.2 Strengths and Weaknesses of Firewalls
9.3 Distributed Firewalls
9.4 Zero Trust Security
9.5 Intrusion Detection and Prevention
About The Book<br>Read the Book
Build the Book
Contribute to the Book
About The Authors
Read The Latest!
Print Copies