Custom cover image
Custom cover image

Network Security Private Communications In a Public World

By: Contributor(s): Material type: TextTextLanguage: English Series: Pearson Series in Computer Networking and Distributed SystemsPublication details: Boston, Addison-Wesley, c2023Edition: 3rdDescription: XX, 455 p. : illISBN:
  • 9780136643609
Subject(s): DDC classification:
  • 005.8 KAU
Online resources: Summary: SUMMARY: A thoroughly-revised edition of the landmark text on computer security This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies. Features New edition of the classic text on computer security from legendary pioneers in network security Thoroughly re-written to reflect contemporary issues in cybersecurity Friendly, intuitive, rigorous, comprehensive, and practical Includes detailed sections on cryptography, authentication, connection protocols, and network applications Contains new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication Illuminates subtle issues missed by books focused solely on implementation details New to this Edition All chapters have been thoroughly updated to reflect today's technologies and threat environment. This edition also contains extensive new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Reference Collection Reference Collection TIEST (Thar) Library Computer Science & Information Technology - Thar Institute 005.8 KAU 2022-23 Available 98020
Reference Collection Reference Collection TIEST (Thar) Library Computer Science & Information Technology - Thar Institute 005.8 KAU 2022-23 Available 98021

SUMMARY:
A thoroughly-revised edition of the landmark text on computer security

This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.

The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.

Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.

Features

New edition of the classic text on computer security from legendary pioneers in network security
Thoroughly re-written to reflect contemporary issues in cybersecurity
Friendly, intuitive, rigorous, comprehensive, and practical
Includes detailed sections on cryptography, authentication, connection protocols, and network applications
Contains new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication
Illuminates subtle issues missed by books focused solely on implementation details

New to this Edition

All chapters have been thoroughly updated to reflect today's technologies and threat environment. This edition also contains extensive new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication.