|
![]() |
|||
|
||||
OverviewAppropriate for all graduate-level and upper-level courses in network or computer security. Widely regarded as the most comprehensive yet comprehensible guide to network security, the First Edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Now, in the 2nd Edition, this books exceptionally distinguished author team draws on its hard-won experience to illuminate every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the books extensive coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards, and Web security. The authors go far beyond documenting standards and technology: they contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Full Product DetailsAuthor: Charlie Kaufman , Radia Perlman , Mike SpecinerPublisher: Pearson Education (US) Imprint: Prentice Hall Edition: 2nd edition Dimensions: Width: 18.40cm , Height: 3.20cm , Length: 23.90cm Weight: 1.266kg ISBN: 9780130460196ISBN 10: 0130460192 Pages: 752 Publication Date: 01 May 2002 Audience: College/higher education , Tertiary & Higher Education Format: Hardback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsAcknowledgments. 1. Introduction. I. CRYPTOGRAPHY. 2. Introduction to Cryptography. 3. Secret Key Cryptography. 4. Modes of Operation. 5. Hashes and Message Digests. 6. Public Key Algorithms. 7. Number Theory. 8. Math with AES and Elliptic Curves. II. AUTHENTICATION. 9. Overview of Authentication Systems. 10. Authentication of People. 11. Security Handshake Pitfalls. 12. Strong Password Protocols. III. STANDARDS. 13. Kerberos V4. 14. Kerberos V5. 15. PKI (Public Key Infrastructure). 16. Real-time Communication Security. 17. IPsec: AH and ESP. 18. IPsec: IKE. 19. SSL/TLS. IV. ELECTRONIC MAIL. 20. Electronic Mail Security. 21. PEM & S/MIME. 22. PGP (Pretty Good Privacy). V. LEFTOVERS. 23. Firewalls. 24. More Security Systems. 25. Web Issues. 26. Folklore. Bibliography. Glossary. Index.ReviewsAuthor InformationCHARLIE KAUFMAN is a Distinguished Engineer at IBM, where he is Chief Security Architect for Lotus Notes and Domino. Previously, he was the Network Security Architect at Digital Equipment Corporation. He chaired the IETF's Web Transaction Security working group and currently serves on the IAB, the IETF's architecture board. RADIA PERLMAN, Distinguished Engineer at Sun Microsystems, is known worldwide for her contributions to bridging (spanning tree algorithm) and routing (link state routing) as well as security (sabotage-proof networks). Perlman is the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, and she is one of the 25 people whose work has most influenced the networking industry, according to Data Communications magazine. MIKE SPECINER is a Senior Consulting Engineer at ThinkEngine Networks and is a recognized expert in mathematical algorithms and operating systems. Combined, this author team holds close to 100 patents. Tab Content 6Author Website:Countries AvailableAll regions |