Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Network security : private communication in a public world
by
Kaufman, Charlie, author
, Perlman, Radia, author
, Speciner, Michael, author
, Perlner, Ray A., author
in
Computer security.
/ Computer networks Security measures.
/ Computers Access control.
/ Réseaux d'ordinateurs Sécurité Mesures.
/ Sécurité informatique.
/ Ordinateurs Accès Contrôle.
/ Computers Access control
/ Computer security
/ Computer networks Security measures
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Network security : private communication in a public world
by
Kaufman, Charlie, author
, Perlman, Radia, author
, Speciner, Michael, author
, Perlner, Ray A., author
in
Computer security.
/ Computer networks Security measures.
/ Computers Access control.
/ Réseaux d'ordinateurs Sécurité Mesures.
/ Sécurité informatique.
/ Ordinateurs Accès Contrôle.
/ Computers Access control
/ Computer security
/ Computer networks Security measures
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Network security : private communication in a public world
by
Kaufman, Charlie, author
, Perlman, Radia, author
, Speciner, Michael, author
, Perlner, Ray A., author
in
Computer security.
/ Computer networks Security measures.
/ Computers Access control.
/ Réseaux d'ordinateurs Sécurité Mesures.
/ Sécurité informatique.
/ Ordinateurs Accès Contrôle.
/ Computers Access control
/ Computer security
/ Computer networks Security measures
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Network security : private communication in a public world
Book
Network security : private communication in a public world
2023
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
The classic guide to cryptography and network security -- now fully updated! \"Alice and Bob are back!\" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) - back of cover.
Publisher
Addison-Wesley
Subject
ISBN
9780136643609, 0136643604
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A25 K39 2023 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.