Network Security Ebook Tooltip Ebooks kunnen worden gelezen op uw computer en op daarvoor geschikte e-readers. Private Communication in a Public World
Afbeeldingen
Sla de afbeeldingen overArtikel vergelijken
- Engels
- E-book
- 9780136643524
- 31 augustus 2022
- Adobe ePub
Samenvatting
The classic guide to cryptography and network security – now fully updated!
“Alice and Bob are back!”
Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.
This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
Coverage includes
-
Network security protocol and cryptography basics
-
Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)
-
First-generation public key algorithms (RSA, Diffie-Hellman, ECC)
-
How quantum computers work, and why they threaten the first-generation public key algorithms
-
Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical
-
Multi-factor authentication of people
-
Real-time communication (SSL/TLS, SSH, IPsec)
-
New applications (electronic money, blockchains)
-
New cryptographic techniques (homomorphic encryption, secure multiparty computation)
Productspecificaties
Inhoud
- Taal
- en
- Bindwijze
- E-book
- Oorspronkelijke releasedatum
- 31 augustus 2022
- Ebook Formaat
- Adobe ePub
- Illustraties
- Nee
Betrokkenen
- Hoofdauteur
- Kaufman Charlie
- Tweede Auteur
- Radia Perlman
- Co Auteur
- Mike Speciner
- Hoofduitgeverij
- Addison-Wesley Professional
Vertaling
- Originele titel
- KAUFMAN:NETWORK SECURITY _c2
Lees mogelijkheden
- Lees dit ebook op
- Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)
Overige kenmerken
- Editie
- 3
- Studieboek
- Nee
EAN
- EAN
- 9780136643524
Je vindt dit artikel in
- Categorieën
- Boek, ebook of luisterboek?
- Ebook
- Taal
- Engels
- Beschikbaarheid
- Leverbaar
- Studieboek of algemeen
- Studieboeken
Kies gewenste uitvoering
Prijsinformatie en bestellen
De prijs van dit product is 61 euro.- E-book is direct beschikbaar na aankoop
- E-books lezen is voordelig
- Dag en nacht klantenservice
- Veilig betalen
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.