Network and internetwork security principles and practice
In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs,...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Englewood Cliffs, N.J. New York
Prentice Hall ; IEEE
1995
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Ch. 1. Overview
- Ch. 2. Conventional Encryption
- Ch. 3. Confidentiality Using Conventional Encryption
- Ch. 4. Public-Key Cryptology
- Ch. 5. Authentication and Digital Signatures
- Ch. 6. Intruders, Viruses, and Worms
- Ch. 7. Cryptographic Algorithms
- Ch. 8. Authentication and Key Exchange
- Ch. 9. Electronic Mail Security
- Ch. 10. Network Management Security.


