Network Security: Private Communication in a Public WorldA comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. In this book the authors go beyond documenting standards and technology; they contrast competing schemes, explain weaknesses and strengths, and describe common mistakes people make when intending to design secure systems.* examines the state of computer network security - what works, what doesnt, and why. * explains clearly the cryptographic algorithms on which most network data systems depend. * provides comprehensive descriptions of many authentication systems, including Kerberos, NetWare, Lotus Notes, DASS, and KryptoKnight. * offers a rigorous treatment of secure electronic mail standards, including PEM, PGP, and X.400. * describes classic security pitfalls and how to avoid them when designing protocols. |
Comentarios de usuarios - Escribir una reseña
Las reseñas no se verifican, pero Google comprueba si hay contenido falso y lo retira una vez identificado
Network security: private communication in a public world
Reseña de usuario - Not Available - Book VerdictThe authors offer a meaty survey of computer security in three broad sections. Opening with cryptography, they describe the meaning of keys and algorithms-a difficult task, requiring a bit of math ... Leer reseña completa
Índice
Kerberos | 11 |
CRYPTOGRAPHY | 39 |
Secret Key Cryptography | 57 |
Página de créditos | |
Otras 19 secciones no se muestran.
Otras ediciones - Ver todo
Network Security: Private Communications in a Public World Mike Speciner,Radia Perlman,Charlie Kaufman Vista previa restringida - 2002 |
Network Security : PRIVATE Communication in a PUBLIC World Radia Perlman,Charlie Kaufman,Mike Speciner No hay ninguna vista previa disponible - 2016 |
Términos y frases comunes
able actually algorithm Alice Alice and Bob Alice's allow assume attack authentication bits block Bob's byte certificate choose ciphertext communication compute conversation cryptographic database decrypt described designed encrypted example exchange field Figure function give given guessing hash IDEA impersonate input instance integrity inverse issued Kerberos known look machine means message digest modify multiple obtain operations output pass password performance plaintext possible prime private key problem protection protocol prove public key quantity reason received recipient relatively prime request requires result scheme secret key sent server session key shared signature signed someone specify square standard stored Suppose talk thing ticket timestamp transmit Trudy trust user's workstation