Guide to Internet Cryptography(Information Security and Cryptography)

互联网密码学指南:安全协议与真实世界的攻击影响

计算机应用

售   价:
751.00
发货周期:通常付款后3-5周到货!
作      者
出  版 社
出版时间
2022年11月09日
装      帧
精装
ISBN
9783031194382
复制
页      码
530
语      种
英文
综合评分
暂无评分
我 要 买
- +
库存 28 本
  • 图书详情
  • 目次
  • 买家须知
  • 书评(0)
  • 权威书评(0)
图书简介
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
· Covers the essential standards in Internet cryptography· Integrates work exercises and problems in each chapter· Focuses especially on IPsec, secure e-mail and TLS· Summarizes real-world cryptography in three introductory chapters· Includes necessary background from computer networks· Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes· Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S
本书暂无推荐
本书暂无推荐
看了又看