Network Security: Private Communications in a Public World (Google eBook)

Front Cover
Pearson Education, Apr 22, 2002 - Computers - 752 pages
1 Review

This is the eBook version of the printed book.

The classic guide to network security--now fully updated!"Bob and Alice are back!"

Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society.

"Network Security, Second Edition" brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web securityCryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial conceptsAuthentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakesCore Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGPWeb security: Security issues associated with URLs, HTTP, HTML, and cookiesSecurity implementations in diverse platforms, including Windows, NetWare, and Lotus Notes

The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

Prentice Hall Series in Computer Networking and Distributed Systems

  

What people are saying - Write a review

Network security: private communication in a public world

User Review  - Not Available - Book Verdict

The authors offer a meaty survey of computer security in three broad sections. Opening with cryptography, they describe the meaning of keys and algorithms-a difficult task, requiring a bit of math ... Read full review

Contents

The Radia Perlman Series in Computer Networking and Security
Acknowledgments
1 Introduction
Cryptography
2 Introduction to Cryptography
3 Secret Key Cryptography
4 Modes of Operation
5 Hashes and Message Digests
15 PKI Public Key Infrastructure
16 RealTime Communication Security
AH and ESP
IKE
19 SSLTLS
Electronic Mail
20 Electronic Mail Security
21 PEM SMIME

6 Public Key Algorithms
7 Number Theory
8 Math with AES and Elliptic Curves
Authentication
9 Overview of Authentication Systems
10 Authentication of People
11 Security Handshake Pitfalls
12 Strong Password Protocols
Standards
13 Kerberos V4
14 Kerberos V5
22 PGP Pretty Good Privacy
Leftovers
23 Firewalls
24 More Security Systems
25 Web Issues
26 Folklore
Bibliography
Glossary
Index
Footnotes
Copyright

Common terms and phrases

About the author (2002)

CHARLIE KAUFMAN is a Distinguished Engineer at IBM, where he is Chief Security Architect for Lotus Notes and Domino. Previously, he was the Network Security Architect at Digital Equipment Corporation. He chaired the IETF's Web Transaction Security working group and currently serves on the IAB, the IETF's architecture board.

RADIA PERLMAN, Distinguished Engineer at Sun Microsystems, is known worldwide for her contributions to bridging (spanning tree algorithm) and routing (link state routing) as well as security (sabotage-proof networks). Perlman is the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, and she is one of the 25 people whose work has most influenced the networking industry, according to Data Communications magazine.

MIKE SPECINER is a Senior Consulting Engineer at ThinkEngine Networks and is a recognized expert in mathematical algorithms and operating systems.

Combined, this author team holds close to 100 patents.

Bibliographic information