MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100104s2003 enka b 000 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2002191050 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0470852852 (alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780470852859 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u3047 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.82 |
| Edition number |
21 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Rhee, Man Young. |
| 9 (RLIN) |
5755 |
| 245 10 - TITLE STATEMENT |
| Title |
Internet security : |
| Remainder of title |
cryptographic principles, algorithms, and protocols / |
| Statement of responsibility, etc. |
Man Young Rhee. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Chichester, West Sussex, England ; |
| -- |
Hoboken, NJ : |
| Name of publisher, distributor, etc. |
J. Wiley, |
| Date of publication, distribution, etc. |
2003. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvii, 405 p. : |
| Other physical details |
ill. ; |
| Dimensions |
26 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references (p. [383]-390) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Preface -- Internetworking and Layered Models -- TCP/IP Suite and Internet Stack Protocols -- Symmetric Block Ciphers -- Hash Function, Message Digest and Message Authentication Code -- Asymmetric Public-key Cryptosystems -- Public-key Infrastructure -- Network Layer Security -- Transport Layer Security: SSLv3 and TLSv1 -- Electronic Mail Security: PGP, S/MIME -- Internet Firewalls for Trusted Systems -- SET for E-commerce Transactions -- Acronyms -- Bibliography -- Index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work. Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time". This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. Internet Security: * Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols - the nuts and bolts of creating a secure network * Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions) * Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents * Authored by a recognised expert in security Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet |
| General subdivision |
Security measures. |
| 9 (RLIN) |
5756 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data encryption (Computer science) |
| 9 (RLIN) |
5757 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Public key cryptography. |
| 9 (RLIN) |
5758 |