Let op: om deze website goed te kunnen gebruiken is het noodzakelijk om Cookies aan te zetten. Meer informatie...
  • Welkom bij Burger, kunt u een boek niet vinden? Bel ons 0182-612298.


  • Welkom bij Burger, kunt u een boek niet vinden? Bel ons 0182-612298.

Network Security

Private Communication in a Public World

Charlie Kaufman; Radia Perlman; Mike Speciner; Ray Perlner

Prijs: € 88,99
Voorraad#stock_type# onbekend
(Geen beoordelingen)
Delen:
Productspecificaties
EAN : 9780136643609
Auteur(s) : Charlie Kaufman; Radia Perlman; Mike Speciner; Ray Perlner
Taal : English
Onderwerp : Datacommunicatie en netwerken
Thema : Netwerkveiligheid
Uitgever : Pearson Education Limited
Verschenen : Mei 2020
Uitvoering : Hardcover
Conditie : Nieuw
Pagina's : 544
Afmetingen : 238 x 185 x 37 mm
Gewicht : 1137 gram
Beschrijving

Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.

This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.

The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.

Velden met een * zijn verplicht