EUR 10,36
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,36
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,36
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,36
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.
Verlag: Pearson Education, Limited, 2003
ISBN 10: 0130669431 ISBN 13: 9780130669438
Sprache: Englisch
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
EUR 11,95
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. 1st. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Verlag: Pearson Education (US), United States, Upper Saddle River, 2003
ISBN 10: 0130669431 ISBN 13: 9780130669438
Sprache: Englisch
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
EUR 102,65
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need. Coverage includes: Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more Authentication: basic techniques and principles vs. misconceptions and consequential attacks Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos Designing stronger counterparts to vulnerable "textbook" crypto schemes Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.