Kaufman, Charlie

Network Security Private Communications In a Public World - 3rd - Boston, Addison-Wesley, c2023 - XX, 455 p. : ill - Pearson Series in Computer Networking and Distributed Systems .

Includes Bibliographical References and Index

SUMMARY:
A thoroughly-revised edition of the landmark text on computer security

This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.

The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.

Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.

Features

New edition of the classic text on computer security from legendary pioneers in network security
Thoroughly re-written to reflect contemporary issues in cybersecurity
Friendly, intuitive, rigorous, comprehensive, and practical
Includes detailed sections on cryptography, authentication, connection protocols, and network applications
Contains new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication
Illuminates subtle issues missed by books focused solely on implementation details

New to this Edition

All chapters have been thoroughly updated to reflect today's technologies and threat environment. This edition also contains extensive new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication.

9780136643609




Computers Access Control
Computer Security
Electronic Data Processing Departments Security Measures

005.8 / KAU