Network Security: Private Communication in a Public World (Paperback) | Released: 15-09-2016
By: Charlie Kaufman (Author) Publisher: Pearson Education925.00$
The first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Honored by Network Magazine as one of the top 10 most useful networking books, it is now fully updated for the latest standards and technologies.In the second... Read More
Out of stock
Ships within 1-2 Business Days
100% Orginal Books
Easy Replacement
Certified product
Secure Checkout
On time delivery
Author:
Charlie Kaufman
Publisher Name:
Pearson Education
Language:
English
Binding:
(Paperback)
About The Book
The first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Honored by Network Magazine as one of the top 10 most useful networking books, it is now fully updated for the latest standards and technologies.In the second edition, the authors draw on their considerable experience to illuminate all facets of information security, from the basics to advanced cryptography and authentication; secure Web and email services and emerging security standards. The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses and identify the crucial errors most likely to compromise secure systems.The highlights of the book’s extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards,and Web security.Table of ContentsChapter 1 IntroductionChapter 2 Introduction to CryptographyChapter 3 Secret Key CryptographyChapter 4 Modes of OperationChapter 5 Hashes and Message DigestsChapter 6 Public Key Algorithms Chapter 7 Overview of Authentication SystemsChapter 8 Authentication of PeopleChapter 9 Security Handshake PitfallsChapter 10 Strong Password ProtocolsChapter 11 Kerberos V4Chapter 12 Kerberos V5 Chapter 13 PKI (Public Key Infrastructure)Chapter 14 Real-time Communication SecurityChapter 15 IPSEC: AH And ESPChapter 16 IPsec: IKEChapter 17 Electronic Mail Security Chapter 18 PEM and S/MIMEChapter 19 PGP (Pretty Good Privacy)Chapter 20 FirewallsChapter 21 More Security SystemsChapter 22 FolkloreChapter 23 Number Theory (online)Chapter 24 Math with AES and Elliptic Curves (online)Chapter 25 SSL/TLS (online)Chapter 26 Web Issues (online)