Ebook339 pages8 hours
Internet Security: Cryptographic Principles, Algorithms and Protocols
Rating: 0 out of 5 stars
()
About this ebook
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system.
However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work.
Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer "if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time". This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems.
Internet Security:
* Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols - the nuts and bolts of creating a secure network
* Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions)
* Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents
* Authored by a recognised expert in security
Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems.
However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work.
Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer "if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time". This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems.
Internet Security:
* Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols - the nuts and bolts of creating a secure network
* Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions)
* Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents
* Authored by a recognised expert in security
Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems.
Related to Internet Security
Related ebooks
Virtual Private Networking: A Construction, Operation and Utilization Guide Rating: 0 out of 5 stars0 ratingsDesigning and Developing Scalable IP Networks Rating: 0 out of 5 stars0 ratingsThe Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsIP over WDM Rating: 0 out of 5 stars0 ratingsMobile Middleware: Supporting Applications and Services Rating: 0 out of 5 stars0 ratingsVoIP: Wireless, P2P and New Enterprise Voice over IP Rating: 0 out of 5 stars0 ratingsMulticast Communication: Protocols, Programming, & Applications Rating: 1 out of 5 stars1/5Ethernet Networks: Design, Implementation, Operation, Management Rating: 4 out of 5 stars4/5Network Infrastructure and Architecture: Designing High-Availability Networks Rating: 0 out of 5 stars0 ratingsAdvanced Wireless Networks: 4G Technologies Rating: 0 out of 5 stars0 ratingsIPTV Security: Protecting High-Value Digital Contents Rating: 4 out of 5 stars4/5Speech Processing for IP Networks: Media Resource Control Protocol (MRCP) Rating: 0 out of 5 stars0 ratings4G Wireless Video Communications Rating: 0 out of 5 stars0 ratingsUnderstanding and Designing Computer Networks Rating: 5 out of 5 stars5/5Networking and Online Games: Understanding and Engineering Multiplayer Internet Games Rating: 5 out of 5 stars5/5Cognitive Radio Networks Rating: 5 out of 5 stars5/5JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures Rating: 0 out of 5 stars0 ratingsSIP Security Rating: 0 out of 5 stars0 ratingsWireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control Rating: 0 out of 5 stars0 ratingsConnection-Oriented Networks: SONET/SDH, ATM, MPLS and Optical Networks Rating: 0 out of 5 stars0 ratingsMobile Telecommunications Protocols for Data Networks Rating: 3 out of 5 stars3/5IP over WDM: Building the Next-Generation Optical Internet Rating: 0 out of 5 stars0 ratingsDigital Audio Broadcasting: Principles and Applications of DAB, DAB + and DMB Rating: 0 out of 5 stars0 ratingsThe Grid: Core Technologies Rating: 0 out of 5 stars0 ratingsNetwork Programming in .NET: With C# and Visual Basic .NET Rating: 3 out of 5 stars3/5Fast and Efficient Context-Aware Services Rating: 0 out of 5 stars0 ratingsEmbedded SoPC Design with Nios II Processor and Verilog Examples Rating: 0 out of 5 stars0 ratingsBroadband Powerline Communications: Network Design Rating: 0 out of 5 stars0 ratingsPractical SCADA for Industry Rating: 4 out of 5 stars4/5Understanding TCP/IP Rating: 4 out of 5 stars4/5
Security For You
Hacking For Dummies Rating: 4 out of 5 stars4/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5
Reviews for Internet Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Internet Security - Man Young Rhee
Enjoying the preview?
Page 1 of 1