Discover

William Stallings

Personal Information

Born February 11, 1822 (204 years old)
United States
Also known as: William Walter Stallings, W. Stallings
49 books
4.1 (17)
628 readers

Description

American Computer Scientist

Books

Newest First

High-speed networks

0.0 (0)
2

As networking speeds continue to increase into the gigabit range, an integrated view of the many technical design issues is needed. This text meets that need by providing comprehensive technical coverage of both TCP/IP based and ATM high speed networks. High-Speed Networks: TCP/IP and ATM Design will be useful to professionals and computer science students. The text includes excellent learning aids such as exercises, recommended reading lists, and a review of the math essential for understanding the issues related to high-speed network performance and design.

ISDN and Broadvand ISDN with Frame Relay and ATM

0.0 (0)
4

William Stallings provides an in-depth presentation of the technology and architecture of integrated services digital networks (ISDN). This book covers the integrated digital network (IDN), ISDN services, architecture, signaling system no. 7 (SS7) and includes a comprehensive treatment of the ITU-T protocol standards. Detailed coverage of protocols and congestion control strategies for both frame relay and ATM are also provided.

Network and internetwork security

0.0 (0)
4

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students. . Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed. Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, is covered. In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.