This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and as a valuable reference or tutorial.
It offers a large section on the discipline of cryptography -- covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. Other topics include IP, web, and network management security, firewalls, and intruders and viruses.