0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Network Security - Private Communication in a Public World (Hardcover, 3rd edition): Charlie Kaufman, Radia Perlman, Mike... Network Security - Private Communication in a Public World (Hardcover, 3rd edition)
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
R1,695 Discovery Miles 16 950 Ships in 18 - 22 working days

The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Understanding Corona Virus (COVID-19…
Tonny Rutakirwa Hardcover R439 R406 Discovery Miles 4 060
Cellular Factors Involved in Early Steps…
John A. T Young Hardcover R2,671 Discovery Miles 26 710
No Time to Lose - A Life in Pursuit of…
Peter Piot Paperback R435 Discovery Miles 4 350
Stromal Signaling in Cancer, Volume 154
Peggi Angel, Michael Ostrowski Hardcover R3,712 Discovery Miles 37 120
COVID-19 Viral Sepsis - Impact on…
Cindy Hou, Uzma Syed Paperback R3,083 Discovery Miles 30 830
Mechanisms and Therapy of Liver Cancer…
Paul B. Fisher, Devanand Sarkar Hardcover R3,734 Discovery Miles 37 340
Advanced Biosensors for Virus Detection…
Raju Khan, Arpana Parihar, … Paperback R3,449 Discovery Miles 34 490
Covid-19 - From Chaos To Cure: From…
Dale Yuzuki Hardcover R590 Discovery Miles 5 900
The Heart in Systemic Autoimmune…
Fabiola Atzeni, Andrea Dorea, … Hardcover R3,534 R3,303 Discovery Miles 33 030
Retroviral Immunology - Immune Response…
Giuseppe Pantaleo, Bruce D Walker Hardcover R4,282 Discovery Miles 42 820

 

Partners