Cart
Sign In
Compare Products
Clear All
Let's Compare!

Network Security

(5.0) 1 Rating Have a question?

MRP  
Rs. 925
  (Inclusive of all taxes)
Rs. 633 32% OFF
(1) Offers | Applicable on cart
Apply for a Snapdeal BOB Credit Card & get 5% Unlimited Cashback T&C
Only 3 Items Left
Delivery
check

Generally delivered in 5 - 9 days

7 Days Replacement
This product can be replaced within 7 days after delivery Know More

Featured

Highlights

  • ISBN13:9789332578210
  • ISBN10:9332578214
  • Publisher:Pearson Education
  • Language:English
  • Author:Charlie Kaufman \nRadia Perlman \nMike Speciner
  • Binding:Paperback
  • Publishing Year:2016
  • Pages:672
  • SUPC: SDL179497991

Other Specifications

Other Details
Country of Origin or Manufacture or Assembly India
Common or Generic Name of the commodity Networking Books
Manufacturer's Name & Address
Packer's Name & Address
Marketer's Name & Address
Importer's Name & Address

Description

The first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. Honored by Network Magazine as one of the top 10 most useful networking books, it is now fully updated for the latest standards and technologies.\nIn the second edition, the authors draw on their considerable experience to illuminate all facets of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. The authors go far beyond documenting standards and technology: they contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems.\nThe highlights of the book’s extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, X.509 and related PKI standards,\nand Web security.\n\nTable of Contents\nCHAPTER 1 Introduction\nCHAPTER 2 Introduction to Cryptography\nCHAPTER 3 Secret Key Cryptography\nCHAPTER 4 Modes of Operation\nCHAPTER 5 Hashes and Message Digests\nCHAPTER 6 Public Key Algorithms \nCHAPTER 7 Overview of Authentication Systems\nCHAPTER 8 Authentication of People\nCHAPTER 9 Security Handshake Pitfalls\nCHAPTER 10 Strong Password Protocols\nCHAPTER 11 Kerberos V4\nCHAPTER 12 Kerberos V5 \nCHAPTER 13 PKI (Public Key Infrastructure)\nCHAPTER 14 Real-time Communication Security\nCHAPTER 15 IPSEC: AH And ESP\nCHAPTER 16 IPsec: IKE\nCHAPTER 17 Electronic Mail Security \nCHAPTER 18 PEM & S/MIME\nCHAPTER 19 PGP (Pretty Good Privacy)\nCHAPTER 20 Firewalls\nCHAPTER 21 More Security Systems\nCHAPTER 22 Folklore\nCHAPTER 23 Number Theory (online)\nCHAPTER 24 Math with AES and Elliptic Curves (online)\nCHAPTER 25 SSL/TLS (online)\nCHAPTER 26 Web Issues (online)

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.

Quick links

Seller Details

View Store


Expand your business to millions of customers