Network Security Private Communication in a Public World

, by ; ;
Network Security Private Communication in a Public World by Kaufman, Charlie; Perlman, Radia; Speciner, Mike, 9780130460196
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780130460196 | 0130460192
  • Cover: Hardcover
  • Copyright: 4/22/2002

  • Buy Used

    Usually Ships in 3-5 Business Days

    $64.14

The classic guide to network security--now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society."Network Security, Second Edition" brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web securityCryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial conceptsAuthentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakesCore Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGPWeb security: Security issues associated with URLs, HTTP, HTML, and cookiesSecurity implementations in diverse platforms, including Windows, NetWare, and Lotus NotesThe authors go far beyond documenting standards and technology: Theycontrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate
Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button