Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      Network Security: Private Communication in a Public World

      2 in stock

      Firm sale: non returnable item
      SKU 9780136643609 Categories ,
      Select Guide Rating
      A thoroughly-revised edition of the landmark text on computer security

      This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. I...

      £66.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9780136643609
      Product Form:Hardback
      Country of Manufacture:US
      Title:Network Security
      Subtitle:Private Communication in a Public World
      Authors:Author: Charlie Kaufman, Ray Perlner, Radia Perlman, Mike Speciner
      Page Count:544
      Subjects:Computer programming / software engineering, Computer programming / software development, Databases, Computer security, Network security, Databases, Computer security, Network security
      Description:Select Guide Rating
      A thoroughly-revised edition of the landmark text on computer security

      This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like:  How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.

      The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.

      Wherever math beyond high school algebra is needed,  Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.

      The classic guide to cryptography and network security – now fully updated!

      “Alice and Bob are back!”

      Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.

      This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field''s jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

      Coverage includes

      • Network security protocol and cryptography basics
      • Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)
      • First-generation public key algorithms (RSA, Diffie-Hellman, ECC)
      • How quantum computers work, and why they threaten the first-generation public key algorithms
      • Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical
      • Multi-factor authentication of people
      • Real-time communication (SSL/TLS, SSH, IPsec) 
      • New applications (electronic money, blockchains)
      • New cryptographic techniques (homomorphic encryption, secure multiparty computation)

       


      Imprint Name:Addison Wesley
      Publisher Name:Pearson Education (US)
      Country of Publication:GB
      Publishing Date:2022-10-24

      Additional information

      Weight1142 g
      Dimensions189 × 240 × 36 mm