Bild 1 von 2


Galerie
Bild 1 von 2


Netzwerksicherheit: Privat - Hardcover, von Kaufman Charlie; Perlman - sehr gut-
US $32,42
Ca.EUR 27,90
Artikelzustand:
Sehr gut
Buch, das nicht neu aussieht und gelesen wurde, sich aber in einem hervorragenden Zustand befindet. Der Einband weist keine offensichtlichen Beschädigungen auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
3 verfügbar1 verkauft
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos USPS Media MailTM.
Standort: Philadelphia, Pennsylvania, USA
Lieferung:
Lieferung zwischen Sa, 18. Okt und Fr, 24. Okt nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Kostenloser Rückversand.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:405373882083
Artikelmerkmale
- Artikelzustand
- Book Title
- Network Security: Private Communication in a Public World (Prenti
- ISBN
- 9780136643609
Über dieses Produkt
Product Identifiers
Publisher
Addison Wesley Professional
ISBN-10
0136643604
ISBN-13
9780136643609
eBay Product ID (ePID)
16038297660
Product Key Features
Number of Pages
544 Pages
Language
English
Publication Name
Network Security : Private Communication in a Public World
Subject
Engineering (General), Security / Networking
Publication Year
2022
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Hardcover
Dimensions
Item Height
1.2 in
Item Weight
35.2 Oz
Item Length
9.4 in
Item Width
7.4 in
Additional Product Features
Edition Number
3
Intended Audience
Scholarly & Professional
Dewey Edition
21
Dewey Decimal
005.8
Synopsis
With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies., A thoroughly-revised edition of the landmark text on computer security This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies., The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security , Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4, The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)
LC Classification Number
TK5105.59
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
BooksRun
99,4% positive Bewertungen•927.799 Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Beliebte Kategorien in diesem Shop
Verkäuferbewertungen (227.259)
Dieser Artikel (1)
Alle Artikel (227.259)
- Automatische Bewertung von eBay- Bewertung vom Käufer.Letzter MonatBestellung pünktlich und problemlos geliefert
- 7***j (851)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufI recently purchased an item from this eBay seller, and I couldn't be happier with the experience. From the prompt communication to the fast shipping, everything was handled with utmost professionalism. The item arrived exactly as described and was well-packaged to ensure its safety during transit. The seller was courteous and responsive, making the entire transaction smooth and hassle-free. I highly recommend this seller to anyone looking for quality products and excellent service.
- c***m (445)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufWOW!; I cannot believe this 4 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 04/19, Sat, Received 04/24 Thur to Hawaii using free shipping; USPS Ground Mail, Paperback Book in Good Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!The Great Crash, 1929 - Paperback, by J K Galbraith - Acceptable (Nr. 125958575357)
- c***e (34)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufThe textbook was better than described. It looks like brand new! The price was appropriate for the type of textbook that it is. The appearance and quality of the textbook was impeccable. The shipping took about 2 weeks to arrive, but the textbook was well worth the wait. Seller packaged my textbook beautifully which ensured that it arrived unharmed and in perfect condition. Excellent seller! I would purchase more items from this seller in the future!
Noch mehr entdecken:
- Charlie Hebdo No. 1178,
- Romane & Erzählungen für Kinder & Jugendliche mit Gute-Nacht-Geschichten & Kinderreimen,
- Gute-Nacht-Geschichten - & -Kinderreime-Belletristik Disney Bücher,
- Gute-Nacht-Geschichten - & -Kinderreime-Belletristik Bücher Mädcheninteresse,
- Gute-Nacht-Geschichten - & -Kinderreime-Belletristik Bücher Freundschaft,
- Gute-Nacht-Geschichten - & -Kinderreime-Belletristik - 4-8 - Jahre Bücher,
- 9-12 Jahre Gute-Nacht-Geschichten - & -Kinderreime-Belletristik-Bücher,
- Gute-Nacht-Geschichten - & -Kinderreime-Belletristik-Jugendliche Mädcheninteresse Bücher,
- Romane & Erzählungen für Kinder & Jugendliche Jugendliche mit Gute-Nacht-Geschichten & Kinderreimen,
- Romane & Erzählungen für Kinder & Jugendliche mit Gute-Nacht-Geschichten & Kinderreimen Erstes Lesen