Local cover image
Local cover image
Local cover image
Local cover image
Image from Google Jackets

Cryptography and Network Security: Principles and Practice

By: Publication details: Noida, Uttar Pradesh: Pearson , 2023Edition: 8Description: 832ISBN:
  • 9789357059718
Subject(s): DDC classification:
  • 005.8 STA
Summary: In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students. Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed. Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, iscovered. In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.
List(s) this item appears in: New Arrivals for the Month of September - 2023 | New Arrivals for the Month of November - 2023 | New Arrivals for the Month of January 2024 | New Arrivals March 2025 - Engineering
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Checked out 09/06/2025 E15781
Reference Book Reference Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Not for loan E15776
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15779
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15777
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15780
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15785
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15778
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15783
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15782
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15784
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E13972
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E13971
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 5 Checked out 17/04/2025 E13201
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 3 Available E13199
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 4 Available E13200
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 6 Checked out 23/04/2025 E13202
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 7 Available E13203
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 1 Available E13197
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) 2 Available E13198
Reference Book Reference Book ACED SC & ST Book Bank - Mezzanine Floor Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Not for loan E12462
Book Book ACED Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E12467
Total holds: 0

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students. Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed. Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, iscovered. In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image Local cover image