711vay 4ifl. Sl1500 .jpg

Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed Systems)


Price: $69.99 - $55.00
(as of Sep 19, 2024 02:48:27 UTC – Details)


The classic guide to cryptography and network security – now fully updated!

“Alice and Bob are back!”

Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.

This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field’s jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

Coverage includes

Network security protocol and cryptography basicsDesign considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)First-generation public key algorithms (RSA, Diffie-Hellman, ECC)How quantum computers work, and why they threaten the first-generation public key algorithmsQuantum-safe public key algorithms: how they are constructed, and optimizations to make them practical
Multi-factor authentication of peopleReal-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains)New cryptographic techniques (homomorphic encryption, secure multiparty computation)


From the Publisher

Cover with drop shadowCover with drop shadow

New coverage on quantum computing

One significant topic covered extensively is quantum computing. It explains what is different about the algorithms a quantum computer can run. It gives intuition into how a quantum computer can factor numbers or do a faster brute-force search. And for post-quantum algorithms, it explains the math problems that the algorithms are based on, how the math problems can be turned into public key systems, and various optimizations from the basic concept that can make the algorithms practical.

Publisher ‏ : ‎ Addison-Wesley Professional; 3rd edition (September 26, 2022)
Language ‏ : ‎ English
Hardcover ‏ : ‎ 544 pages
ISBN-10 ‏ : ‎ 0136643604
ISBN-13 ‏ : ‎ 978-0136643609
Item Weight ‏ : ‎ 2.2 pounds
Dimensions ‏ : ‎ 7.38 x 1.24 x 9.38 inches

Leave a Reply

Your email address will not be published. Required fields are marked *

Comment

Name