Local cover image
Local cover image
Local cover image
Local cover image
Image from Google Jackets

Cryptography and Network Security: Principles and Practice

By: Publication details: Noida, Uttar Pradesh: Pearson , 2023Edition: 8Description: 832ISBN:
  • 9789357059718
Subject(s): DDC classification:
  • 005.8 STA
Summary: In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students. Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed. Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, iscovered. In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.
List(s) this item appears in: New Arrivals for the Month of September - 2023 | New Arrivals for the Month of November - 2023 | New Arrivals for the Month of January 2024
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) Available E13972
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) Available E13971
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 5 Available E13201
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 3 Available E13199
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 4 Available E13200
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 6 Checked out 19/09/2024 E13202
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 7 Available E13203
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 1 Available E13197
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) 2 Available E13198
Reference Book Reference Book Alliance College of Engineering and Design SC & ST Book Bank - Mezzanine Floor CSE & IT 005.8 STA (Browse shelf(Opens below)) Not for loan E12462
Book Book Alliance College of Engineering and Design CSE & IT 005.8 STA (Browse shelf(Opens below)) Available E12467
Total holds: 0

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students. Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed. Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, iscovered. In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image Local cover image