Network Security: Private Communications in a Public World, 3rd edition

Published by Addison-Wesley Professional (August 31, 2022) © 2023

  • Charlie Kaufman
  • Radia Perlman
  • Mike Speciner
  • Ray Perlner
Products list

Access details

  • Digital eBook
  • Instant access
  • Available online, offline and via apps
  • Accessible through the VitalSource Bookshelf

Features

  • Make highlights and notes
  • Listen as the Bookshelf reads to you
  • Search across the eBook content
Products list

Details

  • A print copy
  • Free shipping

Features

  • Contemporary issues in cybersecurity
  • Detailed sections on cryptography
  • Thoroughly re-written

The classic guide to cryptography and network security - now fully updated

Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.

This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, 3rd Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

Coverage includes

  • Network security protocol and cryptography basics
  • Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)
  • First-generation public key algorithms (RSA, Diffie-Hellman, ECC)
  • How quantum computers work, and why they threaten the first-generation public key algorithms
  • Quantum-safe public key algorithms: how they are constructed, and optimisations to make them practical
  • Chapter 1 Introduction
  • Chapter 2 Introduction to Cryptography
  • Chapter 3 Secret Key Cryptography
  • Chapter 4 Modes of Operation
  • Chapter 5 Cryptographic Hashes
  • Chapter 6 First-Generation Public Key Algorithms
  • Chapter 7 Quantum Computing
  • Chapter 8 Post-Quantum Cryptography
  • Chapter 9 Authentication of People
  • Chapter 10 Trusted Intermediaries
  • Chapter 11 Communication Session Establishment
  • Chapter 12 IPsec
  • Chapter 13 SSL/TLS and SSH
  • Chapter 14 Electronic Mail Security
  • Chapter 15 Electronic Money
  • Chapter 16 Cryptographic Tricks
  • Chapter 17 Folklore
  • Glossary
  • Math
  • Bibliography

Need help? Get in touch