Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is the same as your student ID number or Employee ID number for password, please contact Circulation Staff)

Network Security: (Record no. 34525)

MARC details
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 978-0136643609
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Author Mark KAU-N
100 ## - MAIN ENTRY--AUTHOR
Author Name Kaufman, Charlie
245 ## - TITLE STATEMENT
Title Network Security:
Sub-Title Private Communication in a Public World
250 ## - EDITION STATEMENT
Edition statement 3rd Ed;
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of Publication Boston,.
Name of publisher, distributor, etc. Addison-Wesley Professional
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Pages 455p,
490 ## - SERIES STATEMENT
Series Statement (Prentice Hall Series in Computer Networking and Distributed Systems)
500 ## - GENERAL NOTE
General note The classic guide to cryptography and network security – now fully updated!<br/><br/>“Alice and Bob are back!”<br/><br/>Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.<br/><br/>This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.<br/><br/>Coverage includes<br/><br/>Network security protocol and cryptography basics<br/>Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3)<br/>First-generation public key algorithms (RSA, Diffie-Hellman, ECC)<br/>How quantum computers work, and why they threaten the first-generation public key algorithms<br/>Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical<br/>Multi-factor authentication of people<br/>Real-time communication (SSL/TLS, SSH, IPsec)<br/>New applications (electronic money, blockchains)<br/>New cryptographic techniques (homomorphic encryption, secure multiparty computation)
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Include Bibliography and Index.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Holdings
Withdrawn status Not for loan Collection code Permanent Location Current Location Shelving Location Date acquired Source of acquisition Price Inventory number Full Call Number Accession No./Barcode Date last seen Koha item type
    Cyber Security Air University Central Library Islamabad Air University Central Library Islamabad Cyber Security 05/12/2025 Ali Book Service 2530.00 AUCL-0415 005.8 KAU-N P14178 06/26/2025 Book
    Cyber Security Air University Central Library Islamabad Air University Central Library Islamabad Cyber Security 05/12/2025 Ali Book Service 2530.00 AUCL-0415 005.8 KAU-N P14179 06/26/2025 Book
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631