<p><span>The classic guide to cryptography and network security β now fully updated!</span></p><p><span>βAlice and Bob are back!β</span></p><p><span>Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of </span><span>Network
Network Security: Private Communication in a Public World
β Scribed by Charlie Kaufman, Radia Perlman, Mike Speciner
- Publisher
- Prentice Hall
- Year
- 1995
- Tongue
- English
- Leaves
- 513
- Edition
- 1st
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This witty, concisely-written guide to the latest advances in network security protocols provides a critical assessment of the state of network security protocols and mechanisms (what works, what doesn't, and why). It also explains the cryptographic algorithms on which most security systems depend, describes secure electronic mail standards, contrasts competing schemes, and more.
π SIMILAR VOLUMES
<p><span>The classic guide to cryptography and network security β now fully updated!</span></p><p><span>βAlice and Bob are back!β</span></p><p><span>Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of </span><span>Network
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second edition of<i>Network Security</i>, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advan
<p><span>The classic guide to cryptography and network security β now fully updated!</span></p><p><span>βAlice and Bob are back!β</span></p><p><span>Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of </span><span>Network