This witty, concisely-written guide to the latest advances in network security protocols provides a critical assessment of the state of network security protocols and mechanisms (what works, what doesn't, and why). It also explains the cryptographic algorithms on which most security systems depend,
Network Security: Private Communications in a Public World
β Scribed by Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
- Publisher
- Addison-Wesley Professional
- Year
- 2022
- Tongue
- English
- Leaves
- 544
- Series
- Prentice Hall Series in Computer Networking and Distributed Systems
- Edition
- 3
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The classic guide to cryptography and network security β now fully updated!
βAlice and Bob are back!β
Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.
This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the fieldβs jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
Coverage includes
- Network security protocol and cryptography basics
- Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)
- First-generation public key algorithms (RSA, Diffie-Hellman, ECC)
- How quantum computers work, and why they threaten the first-generation public key algorithms
- Quantum computers: how they work, and why they threaten the first-generation public key algorithms
- Multi-factor authentication of people
- Real-time communication (SSL/TLS, SSH, IPsec)Β
- New applications (electronic money, blockchains)
- New cryptographic techniques (homomorphic encryption, secure multiparty computation)
Β
π SIMILAR VOLUMES
<p><span>The classic guide to cryptography and network security β now fully updated!</span></p><p><span>βAlice and Bob are back!β</span></p><p><span>Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of </span><span>Network
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second edition of<i>Network Security</i>, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advan
<p><span>The classic guide to cryptography and network security β now fully updated!</span></p><p><span>βAlice and Bob are back!β</span></p><p><span>Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of </span><span>Network