Contact us
Joined 1 year ago

Buhelm

Irvine
Send a message

Bid

Location's Map

Safety Tips for Buyers

  • Meet seller at a public place
  • Check the item before you buy
  • Pay only after collecting the item
Category: Books & Magazines

LIKE NEW * NETWORK SECURITY – 2ND EDITION….

Irvine 3 weeks ago Views: 2 views
$50
like-new-network-security-2nd-edition-big-0

description

…..PRIVATE communication in a PUBLIC WORLD – INCLUDES IPsec, SSL, PKI, SSL, and Web security

Local pick-up preferred, (please call first), but will ship at the buyer’s expense.

Limited Illustrations

Note: This was a college text book. Some important passages are Hi Lighted in yellow.

Kingston – Books 15 – IMG_7429

Authors: Charlie Kaufman; Radia Perlman; Mike Speciner

Publisher: Prentice Hall

Contents by Chapter (in brief)

Acknowledgements…..xxv

CHAPTER 1. Introduction…..1

CHAPTER 2. Introduction to Cryptography…..41

CHAPTER 3. Secret Key Cryptography…..59

CHAPTER 4. Modes of Operation…..95

CHAPTER 5. Hashes and Message Digest…..117

CHAPTER 6. Public Key Algorithms…..147

CHAPTER 7. Number Theory…..185

CHAPTER 8. Math with AES and Elliptic Curves…..197

CHAPTER 9. Overview of Authentication Systems…..215

CHAPTER 10. Authentication of People…..237

CHAPTER 11. Security Handshake Pitfalls…..257

CHAPTER 12. Strong Password Protocols…..291

CHAPTER 13. Kerberos V4…..307

CHAPTER 14. Kerberos V5…..337

CHAPTER 15. PKI (Public key Infrastructure)…..371

CHAPTER 16. Real-time Communications Security…..403

CHAPTER 17. IPsec: AH and ESP…..423

CHAPTER 18. IPsec: IKE…..441

CHAPTER 19. SSL/TLS

CHAPTER 20. Electronic Mail Security…..501

CHAPTER 21. PEM AND S/MIME…..529

CHAPTER 22. PGP (Pretty Good Privacy)…..567

CHAPTER 23. Firewalls…..585

CHAPTER 24 More Security Systems…..595

CHAPTER 25. WEB ISSUES…..635

CHAPTER 26. Folklore…..653

Bibliography…..675

Glossary…..685

Index…..703

About the Authors

CHARLIE KAUFMAN is a Distinguished Engineer at IBM, where he is Chief Security Architect for Lotus Notes and Domino. Previously, he was the Network Security Architect at Digital Equipment Corporation. He chaired the IETF's Web Transaction Security working group and currently serves on the IAB, the IETF's architecture board.

RADIA PERLMAN, Distinguished Engineer at Sun Microsystems, is known worldwide for her contributions to bridging (spanning tree algorithm) and routing (link state routing) as well as security (sabotage-proof networks). Perlman is the author of _Interconnections: Bridges, Routers, Switches, and Internetworking Protocols_ , and she is one of the 25 people whose work has most influenced the networking industry, according to _Data Communications_ magazine.

MIKE SPECINER is a Senior Consulting Engineer at ThinkEngine Networks and is a recognized expert in mathematical algorithms and operating systems.

Combined, this author team holds close to 100 patents.

Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society.

_Network Security, Second Edition_ brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes:

* All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security * Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts * Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes * Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 * Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP * Web security: Security issues associated with URLs, HTTP, HTML, and cookies * Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes

The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

Prentice Hall Series in Computer Networking and Distributed Systems

Hardcover 713 pages ISBN: 0-13-04619-2