Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Network security : private communications in a public world / Charlie Kaufman, [and 3 others].

By: Contributor(s): Material type: TextTextSeries: Pearson series in computer networking and distributed systemsPublisher: Boston : Pearson/Addison-Wesley, 2023Edition: Third editionDescription: xx, 455 [G-15, M-26, B-14, I-10] pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780136643609
Subject(s): DDC classification:
  • 005.8 K162n
LOC classification:
  • QA76.9.A25  K39 2023
Contents:
Introduction -- Introduction to cryptography -- Secret key cryptography -- Modes of operation -- Cryptographic hashes -- First-generation public key algorithms -- Quantum computing -- Post-quantum cryptography -- Authentication of people -- Trusted intermediates -- Communication session establishment -- IPsec -- SSL/TLS and SSH -- Electronic mail security -- Electronic money -- Cryptographic tricks -- Folklore.
Summary: "With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 005.8 K162n 2023 (Browse shelf(Opens below)) 1-3 Available 029377
Books Books Main Library Circulation Section CIR 005.8 K162n 2023 (Browse shelf(Opens below)) 2-3 Available 030267
Books Books Main Library Circulation Section CIR 005.8 K162n 2023 (Browse shelf(Opens below)) 3-3 Available 030268

Includes bibliographical references index.

Introduction -- Introduction to cryptography -- Secret key cryptography -- Modes of operation -- Cryptographic hashes -- First-generation public key algorithms -- Quantum computing -- Post-quantum cryptography -- Authentication of people -- Trusted intermediates -- Communication session establishment -- IPsec -- SSL/TLS and SSH -- Electronic mail security -- Electronic money -- Cryptographic tricks -- Folklore.

"With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"-- Provided by publisher.

There are no comments on this title.

to post a comment.