Network Security
10%
off

Network Security : Private Communications in a Public World

4.33 (6 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author) 

Free delivery worldwide

Available soon, pre-order now.
When will my order arrive?

Description

With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.
The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.
Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.
show more

Product details

  • Hardback | 900 pages
  • 178 x 235 x 78mm | 2,115g
  • Addison Wesley
  • Boston, United States
  • English
  • 3rd edition
  • 0136643604
  • 9780136643609

Table of contents

1. Introduction
Part I: Cryptography 2. Introduction to Cryptography 3. Secret Key Cryptography 4. Modes of Operation 5. Cryptographic Hashes / Message Digests 6. Public Key Cryptography Schemes 7. Numbers 8. Math generalized number systems 9. Matrices
Part II: Authentication 10. Overview of Authentication 11. Authentication of People 12. Security Handshake Pitfalls 13. Strong Password Protocols
Part III: Connection Protocols 14. Introduction 15. Kerberos 16. Kerberos V5 17. Public Key Infrastructure 18. Realtime Communication 19. IPsec 20. SSH 21. TLS/SSL
Part IV: Applications 21. Electronic Mail 22. Electronic Money 23. Network Security 24. The Web
Part V: Future & Past 25. Quantum Computers 26. Post-Quantum Cryptography 27. Folklore
show more

About Charlie Kaufman

Charlie Kaufman is currently Security Architect for Dell Storage Systems. Previously, he was the Security Architect for Microsoft Azure and before that for Lotus Notes. He has contributed to a number of IETF standards efforts including IPsec, S/MIME, and DNSsec and served as a member of the Internet Architecture Board. He served on the National Academy of Sciences expert panel that wrote the book Trust In Cyberspace.




Radia Perlman is currently a Fellow at Dell Technologies. She is known for her contributions to bridging (spanning tree algorithm), routing (link state routing), and security (distributed systems robust despite malicious participants). She's the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols. She's been elected to the National Academy of Engineering, the Inventors Hall of Fame, the Internet Hall of Fame, and awarded lifetime achievement awards from Usenix and ACM's SIGCOMM. She has a PhD in computer science from MIT.




Ray Perlner is a Mathematician in the Cryptographic Technology Group of the National Institute of Standards and Technology. He has over a dozen research papers focusing primarily on postquantum cryptography. He has degrees in both physics and math from MIT.




Mike Speciner is an MIT-trained technologist with expertise in mathematics, physics, and computer science. He currently serves as CTO and cofounder of The Singing Torah.




Combined, this author team holds close to 200 patents.
show more

Rating details

6 ratings
4.33 out of 5 stars
5 50% (3)
4 33% (2)
3 17% (1)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X