gogogo
Syndetics cover image
Image from Syndetics

Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.

By: Contributor(s): Material type: TextTextSeries: Prentice Hall series in computer networking and distributed systemsPublication details: Upper Saddle River, N.J. : Prentice Hall PTR, 2002.Edition: 2nd edDescription: xxvi, 713 p. : ill. ; 24 cmISBN:
  • 9780130460196 (hbk.)
  • 0130460192 (hbk.)
Subject(s): DDC classification:
  • 005.8 KAU
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Thurles Library Main Collection 005.8 KAU (Browse shelf(Opens below)) Available 30026000010453
Standard Loan Thurles Library Main Collection 005.8 KAU (Browse shelf(Opens below)) 1 Available R16882KRCT

Enhanced descriptions from Syndetics:

Appropriate for all graduate-level and upper-level courses in network or computer security.

Widely regarded as the most comprehensive yet comprehensible guide to network security, the First Edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Now, in the 2nd Edition, this books exceptionally distinguished author team draws on its hard-won experience to illuminate every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards.

Highlights of the books extensive coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards, and Web security. The authors go far beyond documenting standards and technology: they contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems.

Now includes IPsec, SSL, PKI, AES, and Web security--Cover.

Includes bibliographical references (p. 675-684) and index.

Table of contents provided by Syndetics

  • Acknowledgments
  • 1 Introduction
  • Roadmap to the Book
  • What Type of Book Is This?
  • Terminology
  • Notation
  • Primer on Networking
  • Active vs. Passive Attackc
  • Layers and Cryptography
  • Authorization
  • Tempest
  • Key Escrow for Law Enforcement
  • Key Escrow for Careless Users
  • Viruses, Worms, Trojan Horses
  • The Multi-level Model of Security
  • Legal Issues
  • I Cryptography
  • 2 Introduction to Cryptography
  • What Is Cryptography?
  • Breaking an Encryption Scheme
  • Types of Cryptographic Functions
  • Secret Key Cryptography
  • Public Key Cryptography
  • Hash Algorithms
  • Homework
  • 3 Secret Key Cryptography
  • Introduction
  • Generic Block Encryption
  • Data Encryption Standard (DES)
  • International Data Encryption Algorithm (IDEA)
  • Advanced Encryption Standard (AES)
  • RC4
  • Homework
  • 4 Modes of Operation
  • Introduction
  • Encrypting a Large Message
  • Generating MACs
  • Multiple Encryption DES
  • CBC Outside vs. Inside
  • Homework
  • 5 Hashes and Message Digests
  • Introduction
  • Nifty Things to Do with a Hash
  • MD2
  • MD4
  • MD5
  • SHA-1
  • HMAC
  • Homework
  • 6 Public Key Algorithms
  • Introduction
  • Modular Arithmetic
  • RSA
  • Diffie-Hellman
  • Digital Signature Standard (DSS)
  • How Secure Are RSA and Diffie-Hellman?
  • Elliptic Curve Cryptography (ECC)
  • Zero Knowledge Proof Systems
  • Homework Problems
  • 7 Number Theory
  • Introduction
  • Modular Arithmetic
  • Primes
  • Euclid's Algorithm
  • Chinese Remainder Theorem
  • Zn. Euler's Totient Function
  • Euler's Theorem
  • Homework Problems
  • 8 Math with AES and Elliptic Curves
  • Introduction
  • Notation
  • Groups
  • Fields
  • Mathematics of Rijndael
  • Elliptic Curve Cryptography
  • Homework
  • II Authentication
  • 9 Overview of Authentication Systems
  • Password-Based Authentication
  • Address-Based Authentication
  • Cryptographic Authentication Protocols
  • Who Is Being Authenticated?
  • Passwords as Cryptographic Keys
  • Eavesdropping and Server Database Reading
  • Trusted Intermediaries
  • Session Key Establishment
  • Delegation
  • Homework
  • 10 Authentication of People
  • Passwords
  • On-Line Password Guessing
  • Off-Line Password Guessing
  • How Big Should a Secret Be?
  • Eavesdropping
  • Passwords and Careless Users
  • Initial Password Distribution
  • Authentication Tokens
  • Physical Access
  • Biometrics
  • Homework
  • 11 Security Handshake Pitfalls
  • Login Only
  • Mutual Authentication
  • Integrity/Encryption for Data
  • Mediated Authentication (with KDC)
  • Nonce Types
  • Picking Random Numbers
  • Performance Considerations
  • Authentication Protocol Checklist
  • Homework

Author notes provided by Syndetics

Charlie Kaufman's latest film, Human Nature, is currently in production. He lives in Los Angeles.

(Bowker Author Biography)

Powered by Koha