Fülszöveg
Network Security
PRIVATE Communication in a PUBLIC World
A comprehensive yet comprehensible and witty guide to the latest advances in computer network . security protocols. The author team includes Charlie Kaufman, currently chief security architect for Lotus Notes, and formerly Network Security Architect at Digital Equipment ' . Corporation; best-selling author Radia Perlman, currently with Novell, and a
specialist in the areas of bridging and routing, as well as sabotage-proof networks; and Mike Speciner, Chief Architect at ColorAge, an expert in number theory and operating systems, and formerly the security expert for Camex, Inc.
Network Security
¦ examines the state of computer network security—what works, what doesn't, and why.
¦ explains clearly the cryptographic algorithms on which most network data systems depend.
¦ provides comprehensive descriptions of many authentication systems, including Kerberos, NetWare, Lotus Notes, DASS, and KryptoKnight.
¦ offers a...
Tovább
Fülszöveg
Network Security
PRIVATE Communication in a PUBLIC World
A comprehensive yet comprehensible and witty guide to the latest advances in computer network . security protocols. The author team includes Charlie Kaufman, currently chief security architect for Lotus Notes, and formerly Network Security Architect at Digital Equipment ' . Corporation; best-selling author Radia Perlman, currently with Novell, and a
specialist in the areas of bridging and routing, as well as sabotage-proof networks; and Mike Speciner, Chief Architect at ColorAge, an expert in number theory and operating systems, and formerly the security expert for Camex, Inc.
Network Security
¦ examines the state of computer network security—what works, what doesn't, and why.
¦ explains clearly the cryptographic algorithms on which most network data systems depend.
¦ provides comprehensive descriptions of many authentication systems, including Kerberos, NetWare, Lotus Notes, DASS, and KryptoKnight.
¦ offers a rigorous treatment of secure electronic mail standards, including PEM, PGP, and X.400.
¦ describes classic security pitfalls and how to avoid them when designing protocols.
In this book, the authors go beyond documenting standards and technology; they contrast competing schemes, explain weaknesses and strengths, and describe common mistakes people make when intending to design secure systems.
Network Security will appeal to a broad range of professionals, from those who have to design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
Vissza