0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Network Security - Private Communication in a Public World (Hardcover, 3rd edition): Charlie Kaufman, Radia Perlman, Mike... Network Security - Private Communication in a Public World (Hardcover, 3rd edition)
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
R1,695 Discovery Miles 16 950 Ships in 18 - 22 working days

The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Clean Architecture - Tips and Tricks to…
William Vance Hardcover R572 R527 Discovery Miles 5 270
Virtual and Augmented Reality…
Information Reso Management Association Hardcover R9,439 Discovery Miles 94 390
Computer Aided Software Engineering
Hausi A. Muller, Ronald J. Norman, … Hardcover R5,253 Discovery Miles 52 530
Kanban - The Ultimate Guide to Kanban…
James Edge Hardcover R655 R584 Discovery Miles 5 840
Essential Java for Scientists and…
Brian Hahn, Katherine Malan Paperback R1,266 Discovery Miles 12 660
DevOps - The Ultimate Beginners Guide to…
Mark Reed Hardcover R552 R506 Discovery Miles 5 060
Machine Learning Engineering
Andriy Burkov Hardcover R1,255 Discovery Miles 12 550
The Future of Software Quality Assurance
Stephan Goericke Hardcover R1,433 Discovery Miles 14 330
Software Configuration Management…
Alexis Leon Hardcover R2,273 Discovery Miles 22 730
VLISP A Verified Implementation of…
Joshua D. Guttman, Mitchell Wand Hardcover R4,150 Discovery Miles 41 500

 

Partners