Network Security Ebook Tooltip Private Communication in a Public World

Afbeeldingen

Inkijkexemplaar

Artikel vergelijken

  • Engels
  • E-book
  • 9780136643524
  • 31 augustus 2022
  • Adobe ePub
Alle productspecificaties
  • Je leest ebooks gemakkelijk op je Kobo e-reader, of op je smartphone of tablet met de bol.com Kobo app. Let op! Ebooks kunnen niet geannuleerd of geretourneerd worden.

Samenvatting

The classic guide to cryptography and network security – now fully updated!

“Alice and Bob are back!”

Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.

This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

Coverage includes

  • Network security protocol and cryptography basics

  • Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)

  • First-generation public key algorithms (RSA, Diffie-Hellman, ECC)

  • How quantum computers work, and why they threaten the first-generation public key algorithms

  • Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical

  • Multi-factor authentication of people

  • Real-time communication (SSL/TLS, SSH, IPsec)

  • New applications (electronic money, blockchains)

  • New cryptographic techniques (homomorphic encryption, secure multiparty computation)

Productspecificaties

Inhoud

Taal
en
Bindwijze
E-book
Oorspronkelijke releasedatum
31 augustus 2022
Ebook Formaat
Adobe ePub
Illustraties
Nee

Betrokkenen

Hoofdauteur
Kaufman Charlie
Tweede Auteur
Radia Perlman
Co Auteur
Mike Speciner
Hoofduitgeverij
Addison-Wesley Professional

Vertaling

Originele titel
KAUFMAN:NETWORK SECURITY _c2

Lees mogelijkheden

Lees dit ebook op
Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)

Overige kenmerken

Editie
3
Studieboek
Nee

EAN

EAN
9780136643524

Je vindt dit artikel in

Boek, ebook of luisterboek?
Ebook
Taal
Engels
Beschikbaarheid
Leverbaar
Studieboek of algemeen
Studieboeken
Nog geen reviews

Kies gewenste uitvoering

Prijsinformatie en bestellen

De prijs van dit product is 61 euro.
Direct beschikbaar
Verkoop door bol
  • E-book is direct beschikbaar na aankoop
  • E-books lezen is voordelig
  • Dag en nacht klantenservice
  • Veilig betalen
Houd er rekening mee dat je downloadartikelen niet kunt annuleren of retourneren. Bij nog niet verschenen producten kun je tot de verschijningsdatum annuleren.
Zie ook de retourvoorwaarden