- Hardcover: 752 pages
- Publisher: Prentice Hall; 2 edition (May 2, 2002)
- Language: English
- ISBN-10: 0130460192
- ISBN-13: 978-0130460196
- Product Dimensions: 7.3 x 1.1 x 9.5 inches
- Shipping Weight: 2.9 pounds (View shipping rates and policies)
- Average Customer Review: 4.0 out of 5 stars See all reviews (31 customer reviews)
- Amazon Best Sellers Rank: #335,868 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Network Security: Private Communication in a Public World (2nd Edition) 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Discover what to read next through the Amazon Book Review. Learn more.
Frequently bought together
Customers who bought this item also bought
From Library Journal
The authors offer a meaty survey of computer security in three broad sections. Opening with cryptography, they describe the meaning of keys and algorithms-a difficult task, requiring a bit of math that may frighten novices. The second part deals with authentication, or proof of identity on a network. The benefits and pitfalls of different schemes are discussed in a lively and engaging way and are spiced with appropriate quotes throughout. In the final section, E-mail-for some the most chaotic risk of all-is examined. Terms are defined well even for beginners, and exercises at the end of each chapter allow you to test your comprehension of a given set of concepts. But the authors use a notation system (discussed in the introduction) that you'll need to understand to follow some of the examples and arguments. Clearly, this thought-provoking book was designed for serious students of computers and their networks, but even a newbie will find entertaining and useful tidbits.
Copyright 1995 Reed Business Information, Inc. --This text refers to an out of print or unavailable edition of this title.
From the Publisher
A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. In this book the authors go beyond documenting standards and technology; they contrast competing schemes, explain weaknesses and strengths, and describe common mistakes people make when intending to design secure systems. --This text refers to an out of print or unavailable edition of this title.
Browse award-winning titles. See more
If you are a seller for this product, would you like to suggest updates through seller support?
Top Customer Reviews
Chapter 11 alone is worth the (high) price of the book. It is absolutely the best introduction to the subtle issues that arise with network protocols you are likely to ever find. And Chapters 2 through 6 do a better job of covering cryptography (with particular emphasis on some of the not-so-obvious issues) than many books devoted solely to cryptography. And chapter 26 makes some nice points.
One criticism I have is that---with few exceptions---the rest of the book does not come close to the standard achieved in the chapters mentioned above. The chapter on SSL/TLS is OK and the chapter on Kerberos is passable (if dull), but the remaining chapters are relatively weak. Another criticism is that the title of the book is misleading. Outside of the cryptography chapters, the book is very narrowly focused on networking protocols. In my opinion, there is far more to network security than cryptography and protocols. Take a look at Ross Anderson's book, Security Engineering, to get a nice broad overview of security. Finally, the chapters related to IPsec are really poor. The author(s) seems to be so peeved with the standards committee for doing some stupid things that he/she/they do more carping than describing.
In summary, I highly recommend chapters 2 thru 6, 11 and 26. But you'll need to look elsewhere if you want to learn about more than protocols and cryptography.
I would highly recommend avoiding this book and looking elsewhere unless it is required class material in which case you should do your best without it anyway.
Most Recent Customer Reviews
However, I would never recommend this book unless this is a required one for your classes.Read more
The content also was very useful.Read more