000 | 01982cam a2200385Ia 4500 | ||
---|---|---|---|
001 | u4913 | ||
003 | SA-PMU | ||
005 | 20210418124417.0 | ||
008 | 020826s2002 njua b 001 0 eng d | ||
010 | _a 2002281070 | ||
040 |
_aMYG _beng _cMYG _dUKM _dBAKER _dNLGGC _dYDXCP _dOCLCQ _dE3Q _dUAB _dDEBBG _dFZD _dOTP _dSINLB _dOCL |
||
020 | _a0130460192 | ||
020 | _a9780130460196 | ||
035 |
_a(OCoLC)50484192 _z(OCoLC)49640643 |
||
050 | 0 | 0 |
_aQA76.9.A25 _bK39 2002 |
082 | 0 | 4 |
_a005.8 _221 |
100 | 1 | _aKaufman, Charlie. | |
245 | 1 | 0 |
_aNetwork security : _bprivate communication in a public world / _cCharlie Kaufman, Radia Perlman, Mike Speciner. |
250 | _a2nd ed. | ||
260 |
_aUpper Saddle River, N.J. : _bPrentice Hall PTR, _c2002. |
||
300 |
_axxvi, 713 p. : _bill. ; _c24 cm. |
||
490 | 1 | _aPrentice Hall series in computer networking and distributed systems | |
500 | _a"Now includes IPsec, SSL, PKI, AES, and Web security"--Cover. | ||
504 | _aIncludes bibliographical references (p. 675-684) and index. | ||
505 | 0 | _aIntroduction -- Introduction to cryptography -- Secret key cryptography -- Modes of operation -- Hashes and message digests -- Public key algorithms -- Number theory -- Math with AES and elliptic curves -- Overview of authentication systems -- Security handshake pitfalls -- Strong password protocols -- Kerberos V4 -- Kerberos V5 -- PKI (Public Key Infastructures) -- Real-time communication security -- IPsec: AH and ESP -- IPsec: IKE -- SSL/TLS -- Electronic mail security -- PEM & S/MIME -- PGP (Pretty Good Privacy) -- Firewalls -- More security systems -- Web issues -- Folklore. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputers _xAccess control. |
|
650 | 0 |
_aElectronic data processing departments _xSecurity measures. |
|
700 | 1 | _aPerlman, Radia. | |
700 | 1 | _aSpeciner, Mike. | |
830 | 0 | _aPrentice Hall series in computer networking and distributed systems. | |
942 | _cBOOK | ||
994 |
_aZ0 _bSUPMU |
||
596 | _a1 2 | ||
999 |
_c7731 _d7731 |