Professional >> Engineering and Computer Science >> Computer Science >> Computer Science

Network Security: PRIVATE Communication in a PUBLIC World, 2/e

Network Security:  PRIVATE Communication in a PUBLIC World,  2/e

  • Charlie Kaufman
  • Radia Perlman
  • Mike Speciner
  • Author: Charlie Kaufman
    • ISBN:9789332578210
    • 10 Digit ISBN:9332578214
    • Price:Rs. 725.00
    • Pages:672
    • Imprint:Pearson Education
    • Binding:Paperback
    • Status:Available


    The first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Honored by Network Magazine as one of the top 10 most useful networking books, it is now fully updated for the latest standards and technologies.

    In the second edition, the authors draw on their considerable experience to illuminate all facets of information security, from the basics to advanced cryptography and authentication secure Web and email services and emerging security standards. The authors go far beyond documenting standards and technology: they contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems.

    The highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards, and Web security.


    Table of Content

    CHAPTER 1 Introduction
    CHAPTER 2 Introduction to Cryptography
    CHAPTER 3 Secret Key Cryptography
    CHAPTER 4 Modes of Operation
    CHAPTER 5 Hashes and Message Digests
    CHAPTER 6 Public Key Algorithms
    CHAPTER 7 Overview of Authentication Systems
    CHAPTER 8 Authentication of People
    CHAPTER 9 Security Handshake Pitfalls
    CHAPTER 10 Strong Password Protocols
    CHAPTER 11 Kerberos V4
    CHAPTER 12 Kerberos V5
    CHAPTER 13 PKI (Public Key Infrastructure)
    CHAPTER 14 Real-time Communication Security
    CHAPTER 16 IPsec: IKE
    CHAPTER 17 Electronic Mail Security
    CHAPTER 19 PGP (Pretty Good Privacy)
    CHAPTER 20 Firewalls
    CHAPTER 21 More Security Systems
    CHAPTER 22 Folklore
    CHAPTER 23 Number Theory (online)
    CHAPTER 24 Math with AES and Elliptic Curves (online)
    CHAPTER 25 SSL/TLS (online)
    CHAPTER 26 Web Issues (online)

    Salient Features