Picture 1 of 3



Gallery
Picture 1 of 3



Have one to sell?
Network Security : Private Communication in a Public World by Kaufman, 3RD ED.
US $24.44
ApproximatelyC $33.77
Condition:
Brand New
A new, unread, unused book in perfect condition with no missing or damaged pages. See the seller’s listing for full details.
3 available5 sold
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
US $3.99 (approx C $5.51) Economy Shipping.
Located in: Avenel, NJ, United States
Delivery:
Estimated between Thu, Aug 28 and Fri, Sep 5 to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:285973018240
Item specifics
- Condition
- Binding
- SOFTCOVER
- Contents
- SAME as in US edition
- Packing
- Shrinkwrapped- Box Packed
- Product Type
- INTERNATIONAL EDITION
- Actual ISBN
- 9788196874339
- ISBN
- 9780136643609
About this product
Product Identifiers
Publisher
Addison Wesley Professional
ISBN-10
0136643604
ISBN-13
9780136643609
eBay Product ID (ePID)
16038297660
Product Key Features
Number of Pages
544 Pages
Language
English
Publication Name
Network Security : Private Communication in a Public World
Publication Year
2022
Subject
Engineering (General), Security / Networking
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Hardcover
Dimensions
Item Height
1.3 in
Item Weight
40.2 Oz
Item Length
9.4 in
Item Width
7.2 in
Additional Product Features
Edition Number
3
Intended Audience
Scholarly & Professional
Dewey Edition
21
Dewey Decimal
005.8
Synopsis
With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies., A thoroughly-revised edition of the landmark text on computer security This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies., The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security , Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4, The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)
LC Classification Number
TK5105.59
Item description from the seller
Seller feedback (4,170)
This item (1)
All items (4,170)
- c***e (333)- Feedback left by buyer.Past 6 monthsVerified purchaseThe book looks great! Quality and condition exactly as described. Fast shipping and good packaging. Awesome value for the money. Will be a repeat customer!
- s***a (0)- Feedback left by buyer.Past 6 monthsVerified purchaseI had a wonderful experience buying from this seller! They quickly replied to my messages, answering questions that I had on the books. The item description was exactly what I received. The seller also packaged the book set with bubble wrap to make sure there was no damage during shipment. The shipping was quick and I received the item 4 days early! 10/10 experience with this seller!Boys of Tommen 5 Books Set Binding+Keeping+Saving+Redeeming+Taming by Chloe (PB) (#285966862660)
- e***s (3)- Feedback left by buyer.Past 6 monthsVerified purchasethey arrived quickly, sooner than i even expected! they were very nicely and thoroughly wrapped, and in excellent condition. they looked exactly as pictured in the photo and they’re worth the price, considering they’re typically more from big retailers! good, trustworthy seller!
- 5***5 (10)- Feedback left by buyer.Past 6 monthsVerified purchaseGot it 3 days earlier then expected. Great quality was wrapped very well. Great value for the money. All the books were in perfect condition. No rips or bends on the pages excellent. Highly recommend this seller.5-7DAYS DELIVERY-Twilight Series Stephenie Meyer 6 Book Collection Set-Paperback (#285989345960)
More to explore:
- Networks 2010-Now Publication Year Textbooks,
- Networks 2000-2009 Publication Year Textbooks,
- World Atlases 2000-2009 Publication Year,
- World Atlases 1950-1999 Publication Year,
- Ed McBain It Fiction Books & Fiction 1950-1999 Publication Year,
- Ed McBain It Fiction 2010-Now Publication Year Fiction & Books,
- World 2010-Now Publication Year Maps & Atlases,
- David Eddings Fantasy Fiction 2010-Now Publication Year Fiction & Books,
- Webster's New World Dictionaries 2000-2009 Publication Year,
- World War II Nonfiction Books & Fiction 1800-1899 Publication Year