Hardcover: 752 pages
Publisher: Pearson; 6 edition (March 16, 2013)
Language: English
ISBN-10: 0133354695
ISBN-13: 978-0133354690
Product Dimensions: 7.2 x 1.2 x 9.2 inches
Shipping Weight: 2.3 pounds
Average Customer Review: 3.8 out of 5 stars See all reviews (50 customer reviews)
Best Sellers Rank: #276,674 in Books (See Top 100 in Books) #77 in Books > Computers & Technology > Security & Encryption > Encryption #81 in Books > Computers & Technology > Security & Encryption > Cryptography #176 in Books > Computers & Technology > Security & Encryption > Privacy & Online Safety
This book is intended to serve both as a textbook for an academic course of study, and as a self-study and reference guide for practicing professionals. The material has been extended to emphasize encryption and its central position in network protection. The structure and flow have been reorganized with both classroom use and solo instruction in mind, and additional teaching material, such as additional problems, have been added.Chapter one is an introduction to the topics to be covered. In a practical way it outlines the concerns involved in the phrase computer security, and the priorities occasioned by the networked nature of modern computing. There is also an outline of the chapters and sequence in the rest of the book. While the text does note that cryptographic techniques underlie most of current security technologies this is only done briefly. Examples in the major categories listed would help explain this primary position.Part one deals with conventional, symmetric, encryption and the various methods of attacking it. Chapter two covers the historical substitution and transposition ciphers. Symmetric block ciphers are discussed in chapter three, illustrated by an explanation of DES (Data Encryption Standard). The additional conventional algorithms of triple DES, IDEA (International Data Encryption Algorithm), and RC5 are reviewed in chapter four. The use of conventional encryption for confidentiality is outlined in chapter five.Part three looks at public-key encryption and hash functions. Chapter six introduces public-key encryption and its uses in confidentiality, authentication, and key management and exchange. Number theory is the basis of these modern algorithms, so some basic mathematical concepts are outlined in chapter seven.
Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series) Cryptography and Network Security: Principles and Practice (6th Edition) Cryptography and Network Security: Principles and Practice (7th Edition) Cryptography and Network Security: Principles and Practice Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Applied Cryptography: Protocols, Algorithms, and Source Code in C [ APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C BY Schneier, Bruce ( Author ) Nov-01-1995 Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services Network Security Assessment: Know Your Network Network Security: Private Communications in a Public World (Radia Perlman Series in Computer Networking and Security) CompTIA Security+ Guide to Network Security Fundamentals Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security) Cryptography and Coding: 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings (Lecture Notes in Computer Science) Cryptography Engineering: Design Principles and Practical Applications Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) The Practice of Network Security Monitoring: Understanding Incident Detection and Response Principles of Computer Security: CompTIA Security+ and Beyond [With CDROM] (Official Comptia Guide) Descubra los secretos del network marketing: Redes de Mercadeo y Network marketing (Spanish Edition) Network Programmability and Automation: Skills for the Next-Generation Network Engineer Monitor Your Home Network: A How-To Guide to Monitoring a Small, Private Network