TY - BOOK AU - Kaufman, Charlie AU - Perlman, Radia AU - Speciner, Mike TI - Network Security Private Communications In a Public World T2 - Pearson Series in Computer Networking and Distributed Systems SN - 9780136643609 U1 - 005.8 PY - 2023/// CY - Boston, PB - Addison-Wesley, KW - Computers Access Control KW - Computer Security KW - Electronic Data Processing Departments Security Measures N1 - YY N2 - SUMMARY: A thoroughly-revised edition of the landmark text on computer security This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies. Features New edition of the classic text on computer security from legendary pioneers in network security Thoroughly re-written to reflect contemporary issues in cybersecurity Friendly, intuitive, rigorous, comprehensive, and practical Includes detailed sections on cryptography, authentication, connection protocols, and network applications Contains new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication Illuminates subtle issues missed by books focused solely on implementation details New to this Edition All chapters have been thoroughly updated to reflect today's technologies and threat environment. This edition also contains extensive new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication UR - https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780136643609.pdf UR - https://www.pearson.ch/Informatik/Addison-Wesley/EAN/9780136643609/Network-Security-Private-Communication-in-a-Public-World ER -