From Library Journal
The authors offer a meaty survey of computer security in three broad sections. Opening with cryptography, they describe the meaning of keys and algorithms-a difficult task, requiring a bit of math that may frighten novices. The second part deals with authentication, or proof of identity on a network. The benefits and pitfalls of different schemes are discussed in a lively and engaging way and are spiced with appropriate quotes throughout. In the final section, E-mail-for some the most chaotic risk of all-is examined. Terms are defined well even for beginners, and exercises at the end of each chapter allow you to test your comprehension of a given set of concepts. But the authors use a notation system (discussed in the introduction) that you'll need to understand to follow some of the examples and arguments. Clearly, this thought-provoking book was designed for serious students of computers and their networks, but even a newbie will find entertaining and useful tidbits.
Copyright 1995 Reed Business Information, Inc.
From the Publisher
A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. In this book the authors go beyond documenting standards and technology; they contrast competing schemes, explain weaknesses and strengths, and describe common mistakes people make when intending to design secure systems.