Ray Perlner - Network Security : Private Communication in a Public Wor
Ray Perlner - Network Security : Private Communication in a Public Wor
Low stock: 4 left
Free Shipping
Couldn't load pickup availability
About this Item
The item is a book Hardback
The Author Name is Ray Perlner
The Title is Network Security : Private Communication in a Public World
Condition New
Other Comments
New Store Stock
Category - Computers
Product Description -
The classic guide to cryptography and network security – now fully updated! “Alice and Bob are back!” Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basicsDesign considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)First-generation public key algorithms (RSA, Diffie-Hellman, ECC)How quantum computers work, and why they threaten the first-generation public key algorithmsQuantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of peopleReal-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains)New cryptographic techniques (homomorphic encryption, secure multiparty computation)
When possible we will add details of the items we are selling to help buyers know what is included in the item for sale. The details are provided automatically from our central master database and can sometimes be wrong.
Books are released in many editions and variations, such as standard edition, re-issue, not for sale, promotional, special edition, limited edition, and many other editions and versions. The Book you receive could be any of these editions or variations. If you are looking for a specific edition or version please contact us to verify what we are selling.
Gift Ideas
This is a great gift idea.
Hours of Service
We have many warehouses, some of the warehouses process orders seven days a week, but the Administration Support Staff are located at a head office location, outside of the warehouses, and typically work only Monday to Friday.
Location ID 245z
iHaveit SKU ID 1350118585
SKU: SKU:1350118585
Materials
Materials
Dimensions
Dimensions
Care Instructions
Care Instructions
Shipping & Returns
Shipping & Returns
Free Shipping
We provide free shipping for all products within the UK