The Resource Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner
Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner
Resource Information
The item Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- The classic guide to network security--now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Prentice Hall Series in Computer Networking and Distributed Systems
- Language
- eng
- Edition
- Second edition.
- Extent
- 1 online resource (xxvi, 713 pages)
- Contents
-
- Introduction
- Introduction to cryptography
- Secret key cryptography
- Modes of operation
- Hashes and message digests
- Public key algorithms
- Number theory
- Math with AES and elliptic curves
- Overview of authentication systems
- Security handshake pitfalls
- Strong password protocols
- Kerberos V4
- Kerberos V5
- PKI (Public Key Infastructures)
- Real-time communication security
- IPsec: AH and ESP
- IPsec: IKE
- SSL/TLS
- Electronic mail security
- PEM & S/MIME
- PGP (Pretty Good Privacy)
- Firewalls
- More security systems
- Web issues
- Folklore
- Isbn
- 9780132797160
- Label
- Network security : private communication in a public world
- Title
- Network security
- Title remainder
- private communication in a public world
- Statement of responsibility
- Charlie Kaufman, Radia Perlman, Mike Speciner
- Subject
-
- Computer security
- Computernetwerken
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control
- Databescherming
- Datensicherung
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Rechnernetz
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Language
- eng
- Summary
- The classic guide to network security--now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Prentice Hall Series in Computer Networking and Distributed Systems
- Cataloging source
- UMI
- http://library.link/vocab/creatorName
- Kaufman, Charlie
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Perlman, Radia
- Speciner, Michael
- Series statement
- Prentice Hall series in computer networking and distributed systems
- http://library.link/vocab/subjectName
-
- Computer security
- Computers
- Electronic data processing departments
- COMPUTERS
- Computer security
- Computers
- Electronic data processing departments
- Computer security
- Computers
- Electronic data processing departments
- Datensicherung
- Rechnernetz
- Computernetwerken
- Databescherming
- Label
- Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- Introduction to cryptography -- Secret key cryptography -- Modes of operation -- Hashes and message digests -- Public key algorithms -- Number theory -- Math with AES and elliptic curves -- Overview of authentication systems -- Security handshake pitfalls -- Strong password protocols -- Kerberos V4 -- Kerberos V5 -- PKI (Public Key Infastructures) -- Real-time communication security -- IPsec: AH and ESP -- IPsec: IKE -- SSL/TLS -- Electronic mail security -- PEM & S/MIME -- PGP (Pretty Good Privacy) -- Firewalls -- More security systems -- Web issues -- Folklore
- Control code
- 297556570
- Dimensions
- unknown
- Edition
- Second edition.
- Extent
- 1 online resource (xxvi, 713 pages)
- Form of item
- online
- Isbn
- 9780132797160
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000030
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)297556570
- Label
- Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- Introduction to cryptography -- Secret key cryptography -- Modes of operation -- Hashes and message digests -- Public key algorithms -- Number theory -- Math with AES and elliptic curves -- Overview of authentication systems -- Security handshake pitfalls -- Strong password protocols -- Kerberos V4 -- Kerberos V5 -- PKI (Public Key Infastructures) -- Real-time communication security -- IPsec: AH and ESP -- IPsec: IKE -- SSL/TLS -- Electronic mail security -- PEM & S/MIME -- PGP (Pretty Good Privacy) -- Firewalls -- More security systems -- Web issues -- Folklore
- Control code
- 297556570
- Dimensions
- unknown
- Edition
- Second edition.
- Extent
- 1 online resource (xxvi, 713 pages)
- Form of item
- online
- Isbn
- 9780132797160
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000030
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)297556570
Subject
- Computer security
- Computernetwerken
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control
- Databescherming
- Datensicherung
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Rechnernetz
- COMPUTERS -- Security | General
- Computer security
- Computer security
Member of
- Prentice Hall series in computer networking and distributed systems
- O'Reilly Safari Learning Platform: Academic edition
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Network-security--private-communication-in-a/LIKC4aiMSEc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Network-security--private-communication-in-a/LIKC4aiMSEc/">Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Network-security--private-communication-in-a/LIKC4aiMSEc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Network-security--private-communication-in-a/LIKC4aiMSEc/">Network security : private communication in a public world, Charlie Kaufman, Radia Perlman, Mike Speciner</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>