From the Publisher:
This book presents detailed coverage of network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. Opening with a tutorial and survey on network security technology, the book provides a sound mathematical foundation for developing the algorithms and results that are the cornerstone of network security. Each basic building block of network security is covered, including conventional and public-key cryptography, authentication, and digital signatures, as are methods for countering hackers and other intruders and viruses. The balance of the book is devoted to an insightful and thorough discussion of all important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.
From Library Journal:
Ten chapters take the reader through a whirlwind tour that starts with a basic overview, is followed by a description of encryption, cryptology, authentication, and viruses, and ends with a description of current security practices. Covering encryption and authentication, the initial analysis of basic methods and tricks is enlivened by graphics, tables, and examples from popular fiction and history. The second half examines algorithms, authentication, and security for E-mail and networks. The quite readable text, accompanied by plenty of illustrations and tables, make this book a good place to turn to understand the complexities of viruses, cryptanalysis, or digital signatures. The math may frighten away the more numberphobic readers, but overall this text provides a comprehensive and up-to-date introduction to security. (For instructors, there's even an Internet mailing list on security issues; information on it can be found in the preface.)
Copyright 1995 Reed Business Information, Inc.
"About this title" may belong to another edition of this title.