Item added to your basket
You have 0 items in your basket
Subtotal: 0
Discount (10% off): 0
Total cost: 0
Basket / Checkout
Shopping cart
£0.00

Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications - Information Security and Cryptography

4 (1 ratings by Goodreads)

Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
Covers the essential standards in Internet cryptography
Integrates work exercises and problems in each chapter
Focuses especially on IPsec, secure e-mail and TLS
Summarizes real-world cryptography in three introductory chapters
Includes necessary background from computer networks
Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes
Provides additional background on web security in two concluding chapters
Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.
Professor Dr. Jrg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the books topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.


show more
£51.37 New RRP £74.99
You save £23.62

12997

7

Condition - Only 1 left

Free UK Delivery

FREE Returns within 60 days

Description

Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
Covers the essential standards in Internet cryptography
Integrates work exercises and problems in each chapter
Focuses especially on IPsec, secure e-mail and TLS
Summarizes real-world cryptography in three introductory chapters
Includes necessary background from computer networks
Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes
Provides additional background on web security in two concluding chapters
Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.
Professor Dr. Jrg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the books topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.


show more

Book details

  • Format:Hardback
  • Pages:530 Pages
  • Dimensions:235 x 155 mm
  • Publication date:26/11/2022
  • Publisher:Springer International Publishing AG
  • ISBN13:9783031194382
Note:
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.

Note

The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.