Network Security: Private Communication in a Public World 2/e (絕)
- 20本以上,享 8.5折
售價
$
洽詢
- 一般書籍
- ISBN:9780130460196
- 作者:Charlie Kaufman, Radia Perlman
- 版次:2
- 年份:2002
- 出版商:Pearson Education
- 頁數/規格:713頁/平裝單色
書籍介紹
本書特色
目錄
Description
Widely regarded as the most comprehensive yet comprehensible guide to network security, the First Edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Now, in the Second Edition, this books exceptionally distinguished author team draws on its hard-won experience to illuminate every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the books extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards, and Web security. The authors go far beyond documenting standards and technology: they contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems.
Widely regarded as the most comprehensive yet comprehensible guide to network security, the First Edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Now, in the Second Edition, this books exceptionally distinguished author team draws on its hard-won experience to illuminate every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the books extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards, and Web security. The authors go far beyond documenting standards and technology: they contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems.
Features
- Extensive new coverage, including PKI, IPSec, SSL, Web security, and AES.
- Definitive introduction to cryptography, authentication, and major standards.
- First edition was honored by Network Magazine as one of the Top 10 Most Useful networking books!
Table of Contents
1. Introduction.
I. CRYPTOGRAPHY.
2. Introduction to Cryptography.
3. Secret Key Cryptography.
4. Modes of Operation.
5. Hashes and Message Digests.
6. Public Key Algorithms.
7. Number Theory.
8. Math with AES and Elliptic Curves.
II. AUTHENTICATION.
9. Overview of Authentication Systems.
10. Authentication of People.
11. Security Handshake Pitfalls.
12. Strong Password Protocols.
III. STANDARDS.
13. Kerberos V4.
14. Kerberos V5.
15. PKI (Public Key Infrastructure).
16. Real-time Communication Security.
17. IPsec: AH and ESP.
18. IPsec: IKE.
19. SSL/TLS.
IV. ELECTRONIC MAIL.
20. Electronic Mail Security.
21. PEM & S/MIME.
22. PGP (Pretty Good Privacy).
V. LEFTOVERS.
23. Firewalls.
24. More Security Systems.
25. Web Issues.
26. Folklore.
1. Introduction.
I. CRYPTOGRAPHY.
2. Introduction to Cryptography.
3. Secret Key Cryptography.
4. Modes of Operation.
5. Hashes and Message Digests.
6. Public Key Algorithms.
7. Number Theory.
8. Math with AES and Elliptic Curves.
II. AUTHENTICATION.
9. Overview of Authentication Systems.
10. Authentication of People.
11. Security Handshake Pitfalls.
12. Strong Password Protocols.
III. STANDARDS.
13. Kerberos V4.
14. Kerberos V5.
15. PKI (Public Key Infrastructure).
16. Real-time Communication Security.
17. IPsec: AH and ESP.
18. IPsec: IKE.
19. SSL/TLS.
IV. ELECTRONIC MAIL.
20. Electronic Mail Security.
21. PEM & S/MIME.
22. PGP (Pretty Good Privacy).
V. LEFTOVERS.
23. Firewalls.
24. More Security Systems.
25. Web Issues.
26. Folklore.