IBM®
Skip to main content
    Country/region select      Terms of use
 
 
   
     Home      Products      Services & solutions      Support & downloads      My account     
 
developerWorks
AIX and UNIX
Information Mgmt
Lotus
New to Lotus
Products
How to buy
Downloads
Live demos
Technical library
Training
Support
Forums & community
Events
Rational
Tivoli
WebSphere
Java™ technology
Linux
Open source
SOA and Web services
Web development
XML
My developerWorks
About dW
Submit content
Feedback



developerWorks  >  Lotus  >  Technical Library
developerWorks

[back to "Charlie Kaufman: Security Status"]

NETWORK SECURITY: Private Communication in a Public World
by Charlie Kaufman, Radia Perlman and Mike Speciner

Can a book on network security really be comprehensive and entertaining at the same time? This one manages to cover practically everything you'd ever need to know about cryptography, authentication and electronic mail, while interweaving witty quotes by everyone from Alice in Wonderland to Shakespeare.

Whether you're designing or evaluating security systems, you're a systems administrator or programmer who just wants a better understanding of computer network security, this is the place to get it all, and without either the engineering speak or the politicking one inevitably encounters at industry conferences and in the trade rags.

"We believe someone who is a relative novice to the field ought to be able to read this book," say the authors. "But readability doesn't mean lack of technical depth. We try to go beyond the information one might find in specifications. The goal is not just to describe exactly how the various standards and de facto standards work, but to explain why they are the way they are, why some protocols designed for similar purposes are different, and the implications of the design decisions. "

Published by Prentice Hall, Network Security:
  • Examines the state of computer network security and explains what works, what doesn't and why
  • Explains the generic properties of secret key, message digest, and public key algorithms, and how each is used
  • Covers the ins and outs of a variety of security systems including Lotus Notes (up to V4).
  • Describes the various types of e-mail security features and unravels various mail standards including PGP
  • Ends with a checklist of security attacks so you can check your protocol for classic pitfalls and learn how to avoid them.

    Available: at various bookstores and via the Web at http://www.prenhall.com or by calling 1-800-811-0912. 640 pages/$50.00

    Copyright 1997 Iris Associates, Inc. All rights reserved.

  •     About IBM Privacy Contact