Network Security Private Communication in a Public World

ISBN-10: 0130460192

ISBN-13: 9780130460196

Edition: 2nd 2002 (Revised)

List price: $89.99 Buy it from $19.87
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The world's #1 book on network and Internet security has been thoroughly updated to reflect today's latest threats, techniques, and technologies. The long-awaited Network Security, Second Edition brings together definitive, accessible, even entertaining explanations of every key facet of information security. The authors begin by reviewing the challenges of network security, and introducing basic concepts such as authorization and the "military model" of security. They present an easy-to-understand introduction to cryptography, including secret and public keys, hashes, and message digests. A detailed section on authentication addresses the challenge of proving identity across the network; handshakes; and common attacks that must be addressed in designing authentication systems. The authors address core Internet security standards including Kerberos 4/5, PKI, IPSec, and SSL; as well as e-mail security via PEM, S/MIME, and PGP. They offer practical introductions to the Web security issues associated with URLs, HTTP, HTML, and cookies; concluding with overviews of security in environments ranging from Windows to NetWare.

Used Starting from $55.74
eBooks Starting from $71.99
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $89.99
Edition: 2nd
Copyright year: 2002
Publisher: Prentice Hall PTR
Publication date: 4/22/2002
Binding: Hardcover
Pages: 752
Size: 7.25" wide x 9.75" long x 1.50" tall
Weight: 2.750

Charlie Kaufman's latest film, Human Nature, is currently in production. He lives in Los Angeles.

Acknowledgments
Introduction
Roadmap to the Book
What Type of Book Is This?
Terminology
Notation
Primer on Networking
Active vs. Passive Attackc
Layers and Cryptography
Authorization
Tempest
Key Escrow for Law Enforcement
Key Escrow for Careless Users
Viruses, Worms, Trojan Horses
The Multi-level Model of Security
Legal Issues
Cryptography
Introduction to Cryptography
What Is Cryptography?
Breaking an Encryption Scheme
Types of Cryptographic Functions
Secret Key Cryptography
Public Key Cryptography
Hash Algorithms
Homework
Secret Key Cryptography
Introduction
Generic Block Encryption
Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
Advanced Encryption Standard (AES)
RC4
Homework
Modes of Operation
Introduction
Encrypting a Large Message
Generating MACs
Multiple Encryption DES
CBC Outside vs. Inside
Homework
Hashes and Message Digests
Introduction
Nifty Things to Do with a Hash
MD2
MD4
MD5
SHA-1
HMAC
Homework
Public Key Algorithms
Introduction
Modular Arithmetic
RSA
Diffie-Hellman
Digital Signature Standard (DSS)
How Secure Are RSA and Diffie-Hellman?
Elliptic Curve Cryptography (ECC)
Zero Knowledge Proof Systems
Homework Problems
Number Theory
Introduction
Modular Arithmetic
Primes
Euclid's Algorithm
Chinese Remainder Theorem
Zn. Euler's Totient Function
Euler's Theorem
Homework Problems
Math with AES and Elliptic Curves
Introduction
Notation
Groups
Fields
Mathematics of Rijndael
Elliptic Curve Cryptography
Homework
Authentication
Overview of Authentication Systems
Password-Based Authentication
Address-Based Authentication
Cryptographic Authentication Protocols
Who Is Being Authenticated?
Passwords as Cryptographic Keys
Eavesdropping and Server Database Reading
Trusted Intermediaries
Session Key Establishment
Delegation
Homework
Authentication of People
Passwords
On-Line Password Guessing
Off-Line Password Guessing
How Big Should a Secret Be?
Eavesdropping
Passwords and Careless Users
Initial Password Distribution
Authentication Tokens
Physical Access
Biometrics
Homework
Security Handshake Pitfalls
Login Only
Mutual Authentication
Integrity/Encryption for Data
Mediated Authentication (with KDC)
Nonce Types
Picking Random Numbers
Performance Considerations
Authentication Protocol Checklist
Homework
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×