Imagen de portada de Amazon
Imagen de Amazon.com

Network security

Por: Colaborador(es): Estados Unidos Pearson 2023Edición: 3a edDescripción: 3a edTipo de contenido:
  • texto
Tipo de medio:
  • no mediado
Tipo de soporte:
  • volumen
ISBN:
  • 9780136643609
Tema(s): Clasificación CDD:
  • Tercera 004.056 K21n
Contenidos:
Introduction; Introduction to cryptography; Secret key cryptography; Modes of operation; Cryptograpic hashes; First-generation public key algorithms; Quantum computing; Post-quantum cryptography; Authentication of people; Trusted intermediaries; Communication session establishment
Resumen: Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of readers, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Imagen de cubierta Tipo de ítem Biblioteca actual Biblioteca de origen Colección Ubicación en estantería Signatura topográfica Materiales especificados Info Vol URL Copia número Estado Notas Fecha de vencimiento Código de barras Reserva de ítems Prioridad de la cola de reserva de ejemplar Reservas para cursos
Libros Biblioteca Central UTEQ 000 - Obras Generales 004.056/K21n (Navegar estantería(Abre debajo)) Ej.1 Disponible Biblioteca Central-UTEQ 39494738236
Libros Biblioteca Central UTEQ 000 - Obras Generales 004.056/K21n (Navegar estantería(Abre debajo)) Ej.2 Disponible Biblioteca Central-UTEQ 39494738237

Estado de integridad: completo

Introduction; Introduction to cryptography; Secret key cryptography; Modes of operation; Cryptograpic hashes; First-generation public key algorithms; Quantum computing; Post-quantum cryptography; Authentication of people; Trusted intermediaries; Communication session establishment

Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of readers, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.

No hay comentarios en este titulo.

para colocar un comentario.