Network Security Private Communication in a Public World

by ; ; ;
Edition: 3rd
Format: Hardcover
Pub. Date: 2022-09-26
Publisher(s): Addison-Wesley Professional
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $69.99

Buy New

Usually Ships in 8 - 10 Business Days.
$69.92

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$80.39
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$80.39*

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don’t have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.

The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.

Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.

Author Biography

Charlie Kaufman is currently Security Architect for Dell Storage Systems. Previously, he was the Security Architect for Microsoft Azure and before that for Lotus Notes. He has contributed to a number of IETF standards efforts including IPsec, S/MIME, and DNSsec and served as a member of the Internet Architecture Board. He served on the National Academy of Sciences expert panel that wrote the book Trust In Cyberspace.


Radia Perlman is currently a Fellow at Dell Technologies. She is known for her contributions to bridging (spanning tree algorithm), routing (link state routing), and security (distributed systems robust despite malicious participants). She’s the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols. She’s been elected to the National Academy of Engineering,  the Inventors Hall of Fame, the Internet Hall of Fame, and awarded lifetime achievement awards from Usenix and ACM’s SIGCOMM. She has a PhD in computer science from MIT.


Ray Perlner is a Mathematician in the Cryptographic Technology Group of the National Institute of Standards and Technology. He has over a dozen research papers focusing primarily on postquantum cryptography. He has degrees in both physics and math from MIT.


Mike Speciner is an MIT-trained technologist with expertise in mathematics, physics, and computer science. He currently serves as CTO and cofounder of The Singing Torah.


Combined, this author team holds close to 200 patents.

Table of Contents

1. Introduction

Part I: Cryptography
2. Introduction to Cryptography
3. Secret Key Cryptography
4. Modes of Operation
5. Cryptographic Hashes / Message Digests
6. Public Key Cryptography Schemes
7. Numbers
8. Math generalized number systems
9. Matrices

Part II: Authentication
10. Overview of Authentication
11. Authentication of People
12. Security Handshake Pitfalls
13. Strong Password Protocols

Part III: Connection Protocols
14. Introduction
15. Kerberos
16. Kerberos V5
17. Public Key Infrastructure
18. Realtime Communication
19. IPsec
20. SSH
21. TLS/SSL

Part IV: Applications
21. Electronic Mail
22. Electronic Money
23. Network Security
24. The Web

Part V: Future & Past
25. Quantum Computers
26. Post-Quantum Cryptography
27. Folklore

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.