|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn297556570 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2002 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d TOL
|d OCLCQ
|d CEF
|d OCLCQ
|d OCLCE
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCA
|d YDX
|d N$T
|d OCLCA
|d AU@
|d OCLCO
|d UAB
|d WYU
|d OCLCO
|d VT2
|d OCLCQ
|d ERF
|d OCLCO
|d OCLCQ
|d UKAHL
|d OCLCQ
|
019 |
|
|
|a 654275502
|a 1044298294
|a 1056316052
|a 1062891981
|a 1103271386
|
020 |
|
|
|a 9780132797160
|q (electronic bk.)
|
020 |
|
|
|a 013279716X
|q (electronic bk.)
|
020 |
|
|
|z 9780137155880
|
020 |
|
|
|z 0137155883
|
020 |
|
|
|z 9780130460196
|
020 |
|
|
|z 0130460192
|
029 |
1 |
|
|a AU@
|b 000067110410
|
029 |
1 |
|
|a CHBIS
|b 006150556
|
029 |
1 |
|
|a CHVBK
|b 17130652X
|
029 |
1 |
|
|a DEBSZ
|b 355403331
|
029 |
1 |
|
|a HEBIS
|b 291476163
|
035 |
|
|
|a (OCoLC)297556570
|z (OCoLC)654275502
|z (OCoLC)1044298294
|z (OCoLC)1056316052
|z (OCoLC)1062891981
|z (OCoLC)1103271386
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
084 |
|
|
|a 54.32
|2 bcl
|
084 |
|
|
|a ST 273
|2 rvk
|
084 |
|
|
|a ST 276
|2 rvk
|
084 |
|
|
|a DAT 256f
|2 stub
|
084 |
|
|
|a DAT 461f
|2 stub
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kaufman, Charlie,
|e author.
|
245 |
1 |
0 |
|a Network security :
|b private communication in a public world /
|c Charlie Kaufman, Radia Perlman, Mike Speciner.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Upper Saddle River, N.J. :
|b Prentice Hall PTR,
|c 2002.
|
300 |
|
|
|a 1 online resource (xxvi, 713 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Prentice Hall series in computer networking and distributed systems
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed October 27, 2017)
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction -- Introduction to cryptography -- Secret key cryptography -- Modes of operation -- Hashes and message digests -- Public key algorithms -- Number theory -- Math with AES and elliptic curves -- Overview of authentication systems -- Security handshake pitfalls -- Strong password protocols -- Kerberos V4 -- Kerberos V5 -- PKI (Public Key Infastructures) -- Real-time communication security -- IPsec: AH and ESP -- IPsec: IKE -- SSL/TLS -- Electronic mail security -- PEM & S/MIME -- PGP (Pretty Good Privacy) -- Firewalls -- More security systems -- Web issues -- Folklore.
|
520 |
|
|
|a The classic guide to network security--now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Prentice Hall Series in Computer Networking and Distributed Systems
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Electronic data processing departments
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Centres de traitement de l'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computers
|x Access control.
|2 blmlsh
|
650 |
|
7 |
|a Electronic data processing departments
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
650 |
|
7 |
|a Electronic data processing departments
|x Security measures.
|2 fast
|0 (OCoLC)fst00907090
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
650 |
|
7 |
|a Rechnernetz
|2 gnd
|
650 |
1 |
7 |
|a Computernetwerken.
|2 gtt
|
650 |
1 |
7 |
|a Databescherming.
|2 gtt
|
700 |
1 |
|
|a Perlman, Radia,
|e author.
|
700 |
1 |
|
|a Speciner, Michael,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Kaufman, Charlie.
|t Network security.
|b Second edition.
|d Upper Saddle River, N.J. : Prentice Hall PTR, 2002
|w (DLC) 2002281070
|
830 |
|
0 |
|a Prentice Hall series in computer networking and distributed systems.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780137155880/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38513686
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1596030
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858257
|
994 |
|
|
|a 92
|b IZTAP
|