For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing traditional passwords for computer security. Describes and compares the systems currently available, including Kerberos, NetSP, SPX, TESS, and SESAME. A
"synopsis" may belong to another edition of this title.
As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network.
"About this title" may belong to another edition of this title.
FREE shipping within United Kingdom
Destination, rates & speedsSeller: Bahamut Media, Reading, United Kingdom
Hardcover. Condition: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 6545-9780890065105
Quantity: 1 available
Seller: AwesomeBooks, Wallingford, United Kingdom
Hardcover. Condition: Very Good. Authentication Systems for Secure Networks (Computer Science Library) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 7719-9780890065105
Quantity: 1 available
Seller: Ammareal, Morangis, France
Hardcover. Condition: Bon. Ancien livre de bibliothèque. Traces d'usure sur la couverture. Edition 1996. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Signs of wear on the cover. Edition 1996. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # D-568-978
Quantity: 1 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9780890065105_new
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9780890065105
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9780890065105
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 508. Seller Inventory # C9780890065105
Quantity: Over 20 available
Seller: moluna, Greven, Germany
Condition: New. KlappentextrnrnThis unique book explores the use of cryptographic techniques in authentication and key distribution systems. Systems such as Kerberos, NetSP, SPX, TESS, and SESAME are analyzed and compared. Computer scientists, electrical engine. Seller Inventory # 898961644
Quantity: Over 20 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar2317530026996
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. Neuware - As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network. Seller Inventory # 9780890065105
Quantity: 2 available