000 | 02831nam a22003257a 4500 | ||
---|---|---|---|
001 | 22657086 | ||
003 | IIITD | ||
005 | 20240817114130.0 | ||
008 | 220616s2022 nju 000 0 eng | ||
010 | _a 2022941173 | ||
020 | _a9788196874339 | ||
040 |
_aDLC _beng _erda _cDLC |
||
042 | _apcc | ||
082 |
_a005.8 _bKAU-N |
||
245 | 1 | 0 |
_aNetwork security : _bprivate communications in a public world _cby Charlie Kaufman ... [et al.] |
250 | _a3rd ed. | ||
260 |
_aNoida : _bPearson, _c©2024 |
||
263 | _a2209 | ||
300 |
_axxi, 429 p. : _bill. ; _c24 cm. |
||
505 |
_t1. Introduction _t2. Introduction to Cryptography _t3. Secret Key Cryptography _t4. Modes of Operation _t5. Cryptographic Hashes _t6. First-Generation Public Key Algorithms _t7. Quantum Computing _t8. Post-Quantum Cryptography _t9. Authentication of People _t10. Trusted Intermediaries _t11. Communication Session Establishment _t13. SSL/TLS and SSH _t14. Electronic Mail Security _t15. Electronic Money _t16. Cryptographic Tricks _t17. Folklore |
||
520 | _a"With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"-- | ||
650 | _aNetwork Security | ||
700 | 1 | _aKaufman, Charlie | |
700 | 1 | _aPerlman, Radia | |
700 | 1 | _aSpeciner, Mike | |
700 | 1 | _aPerlner, Ray | |
906 |
_a0 _bibc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c189602 _d189602 |