Network Security: Private Communication in a Public World (Paperback)  | Released: 15-09-2016

By: Charlie Kaufman (Author)   Publisher: Pearson Education
(1)

925.00$

The first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Honored by Network Magazine as one of the top 10 most useful networking books, it is now fully updated for the latest standards and technologies.In the second... Read More

Out of stock

Ships within 1-2 Business Days

100% Orginal Books

Easy Replacement

Certified product

Secure Checkout

On time delivery

Author:

Charlie Kaufman

Publisher Name:

Pearson Education

Language:

English

Binding:

(Paperback)

About The Book
The first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Honored by Network Magazine as one of the top 10 most useful networking books, it is now fully updated for the latest standards and technologies.In the second edition, the authors draw on their considerable experience to illuminate all facets of information security, from the basics to advanced cryptography and authentication; secure Web and email services and emerging security standards. The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses and identify the crucial errors most likely to compromise secure systems.The highlights of the book’s extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards,and Web security.Table of ContentsChapter 1 IntroductionChapter 2 Introduction to CryptographyChapter 3 Secret Key CryptographyChapter 4 Modes of OperationChapter 5 Hashes and Message DigestsChapter 6 Public Key Algorithms Chapter 7 Overview of Authentication SystemsChapter 8 Authentication of PeopleChapter 9 Security Handshake PitfallsChapter 10 Strong Password ProtocolsChapter 11 Kerberos V4Chapter 12 Kerberos V5 Chapter 13 PKI (Public Key Infrastructure)Chapter 14 Real-time Communication SecurityChapter 15 IPSEC: AH And ESPChapter 16 IPsec: IKEChapter 17 Electronic Mail Security Chapter 18 PEM and S/MIMEChapter 19 PGP (Pretty Good Privacy)Chapter 20 FirewallsChapter 21 More Security SystemsChapter 22 FolkloreChapter 23 Number Theory (online)Chapter 24 Math with AES and Elliptic Curves (online)Chapter 25 SSL/TLS (online)Chapter 26 Web Issues (online)