[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Network security: private communication in a public world, second editionApril 2002
Publisher:
  • Prentice Hall Press
  • One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-715588-0
Published:22 April 2002
Pages:
752
Skip Bibliometrics Section
Reflects downloads up to 20 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

The classic guide to network securityï now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society.Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.Prentice Hall Series in Computer Networking and Distributed Systems

Cited By

  1. Karafili E, Spanaki K and Lupu E (2018). An argumentation reasoning approach for data processing, Computers in Industry, 94:C, (52-61), Online publication date: 1-Jan-2018.
  2. ACM
    Erkan A, Barr J, Clear T, Izu C, del Alamo C, Mohammed H and Nadimpalli M Developing a Holistic Understanding of Systems and Algorithms through Research Papers Proceedings of the 2017 ITiCSE Conference on Working Group Reports, (86-104)
  3. ACM
    Chen Y, Su L and Xu J (2017). Distributed Statistical Machine Learning in Adversarial Settings, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 1:2, (1-25), Online publication date: 19-Dec-2017.
  4. Asghar M, Fleury M and Makki S (2017). Interoperable conditional access with video selective encryption for portable devices, Multimedia Tools and Applications, 76:11, (13139-13152), Online publication date: 1-Jun-2017.
  5. Bagga P, Hans R and Sharma V (2017). A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture, Expert Systems with Applications: An International Journal, 72:C, (269-282), Online publication date: 15-Apr-2017.
  6. ACM
    Karafili E and Lupu E Enabling Data Sharing in Contextual Environments Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, (231-238)
  7. Yang X, Lu R, Liang H and Tang X (2016). SFPM, Big Data Research, 3:C, (2-9), Online publication date: 1-Apr-2016.
  8. Wei M and Wang W (2016). Data-centric threats and their impacts to real-time communications in smart grid, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (174-188), Online publication date: 20-Jul-2016.
  9. Zou C and Chigan C (2016). Dynamic spectrum access-based cryptosystem for cognitive radio networks, Security and Communication Networks, 9:17, (4151-4165), Online publication date: 25-Nov-2016.
  10. ACM
    Andersen A SNOOP Proceedings of the 13th Workshop on Adaptive and Reflective Middleware, (1-6)
  11. Bonneau J and Schechter S Towards reliable storage of 56-bit secrets in human memory Proceedings of the 23rd USENIX conference on Security Symposium, (607-623)
  12. Yang W, Hu J, Wang S and Stojmenovic M (2014). An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures, Pattern Recognition, 47:3, (1309-1320), Online publication date: 1-Mar-2014.
  13. Weiss R, Mache J and Nilsen E (2013). Top 10 hands-on cybersecurity exercises, Journal of Computing Sciences in Colleges, 29:1, (140-147), Online publication date: 1-Oct-2013.
  14. ACM
    Blanchard K and Soltys M Perceptions of foundational knowledge by computer science students Proceedings of the Seventeenth Western Canadian Conference on Computing Education, (19-23)
  15. Weiss R and Mache J (2011). Teaching security labs with web applications, buffer overflows and firewall configurations, Journal of Computing Sciences in Colleges, 27:1, (163-170), Online publication date: 1-Oct-2011.
  16. Fu Y and Peng X Web application security based on trusted network connection Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II, (420-427)
  17. ACM
    Diesburg S and Wang A (2010). A survey of confidential data storage and deletion methods, ACM Computing Surveys, 43:1, (1-37), Online publication date: 1-Nov-2010.
  18. Dacosta I and Traynor P Proxychain Proceedings of the 2010 USENIX conference on USENIX annual technical conference, (10-10)
  19. Munakata T and Barták R (2010). Logic programming for combinatorial problems, Artificial Intelligence Review, 33:1-2, (135-150), Online publication date: 1-Feb-2010.
  20. Zhou Y, Wu D and Nettles S (2010). On the architecture of Authentication, Authorisation, and Accounting for real-time secondary market services, International Journal of Wireless and Mobile Computing, 4:3, (240-248), Online publication date: 1-Jul-2010.
  21. Warnier M and Brazier F (2010). Anonymity services for multi-agent systems, Web Intelligence and Agent Systems, 8:2, (219-232), Online publication date: 1-Apr-2010.
  22. Jonge W and Jacobs B Privacy-Friendly Electronic Traffic Pricing via Commits Formal Aspects in Security and Trust, (143-161)
  23. Song S and Jaja J (2009). Techniques to audit and certify the long-term integrity of digital archives, International Journal on Digital Libraries, 10:2-3, (123-131), Online publication date: 1-Aug-2009.
  24. Lu H and Ali A Security, privacy, and usability Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security, (51-57)
  25. Lang A, Dittmann J, Kiltz S and Hoppe T Future perspectives Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (40-53)
  26. Jun Cheol Park and Sneha Kumar Kasera Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2843-2848)
  27. Zhu H and Cao G (2006). rDCF, IEEE Transactions on Mobile Computing, 5:9, (1201-1214), Online publication date: 1-Sep-2006.
  28. Jeon J, Kim K, Kang B and Yoo K Cellular automata architecture for elliptic curve cryptographic hardware Proceedings of the 6th international conference on Computational Science - Volume Part III, (329-336)
  29. Jeon J, Kim K, Oh J and Yoo K Modular divider for elliptic curve cryptographic hardware based on programmable CA Proceedings of the 6th international conference on Computational Science - Volume Part IV, (661-668)
  30. Goyal V, Jain A and Quisquater J Improvements to mitchell's remote user authentication protocol Proceedings of the 8th international conference on Information Security and Cryptology, (69-80)
  31. Schlaeger C and Pernul G Authentication and authorisation infrastructures in b2c e-commerce Proceedings of the 6th international conference on E-Commerce and Web Technologies, (306-315)
  32. Ahmad I and Shoba Das A (2005). Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs, Computers and Electrical Engineering, 31:6, (345-360), Online publication date: 1-Sep-2005.
  33. Jeon J and Yoo K An evolutionary approach to the design of cellular automata architecture for multiplication in elliptic curve cryptography over finite fields Proceedings of the 8th Pacific Rim International Conference on Trends in Artificial Intelligence, (241-250)
  34. Litwin W and Schwarz T Algebraic Signatures for Scalable Distributed Data Structures Proceedings of the 20th International Conference on Data Engineering
  35. Lerner R (1998). Protecting Your Site with Access Controls, Linux Journal, 1998:49es, (13-es), Online publication date: 1-May-1998.
Contributors
  • Microsoft Corporation
  • Intel Corporation
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations