|

 | [back to "Charlie Kaufman: Security Status"]
NETWORK SECURITY: Private Communication in a Public World
by Charlie Kaufman, Radia Perlman and Mike Speciner
Can a book on network security really be comprehensive and entertaining at the same time? This one manages to cover practically everything you'd ever need to know about cryptography, authentication and electronic mail, while interweaving witty quotes by everyone from Alice in Wonderland to Shakespeare.
Whether you're designing or evaluating security systems, you're a systems administrator or programmer who just wants a better understanding of computer network security, this is the place to get it all, and without either the engineering speak or the politicking one inevitably encounters at industry conferences and in the trade rags.
"We believe someone who is a relative novice to the field ought to be able to read this book," say the authors. "But readability doesn't mean lack of technical depth. We try to go beyond the information one might find in specifications. The goal is not just to describe exactly how the various standards and de facto standards work, but to explain why they are the way they are, why some protocols designed for similar purposes are different, and the implications of the design decisions. "
Published by Prentice Hall, Network Security:
Examines the state of computer network security and explains what works, what doesn't and why
Explains the generic properties of secret key, message digest, and public key algorithms, and how each is used
Covers the ins and outs of a variety of security systems including Lotus Notes (up to V4).
Describes the various types of e-mail security features and unravels various mail standards including PGP
Ends with a checklist of security attacks so you can check your protocol for classic pitfalls and learn how to avoid them.
Available: at various bookstores and via the Web at http://www.prenhall.com or by calling 1-800-811-0912. 640 pages/$50.00
Copyright 1997 Iris Associates, Inc. All rights reserved.

|
 |  |
|