Monday, February 2, 2009

Beyond Human or Network Security Essentials

Beyond Human: Living with Robots and Cyborgs

Author: Gregory Benford

Would your body work better with some artificial parts? Will you live longer, perhaps a lot longer, than you now expect?  The next decade promises another qualitative shift in the way we view technology, as once purely fictional concepts—robots, cyborg parts, and the many variations in between—become part of reality.

Beyond Human treats the landscape of human self-change and robotic development as poles of the same phenomenon. Can we go too far in making ourselves machine-like or making machines resemble us? Once made, what will such creatures think about us? These questions will arise in myriad ways in the next few decades, as we press against boundaries that a short while ago existed only in works of the imagination. Written in a lively and provocative style, this is a readable book about the accumulation of small scientific advances that add up to something large and challenging.



Go to: Ten Years Younger or Cross Training For Dummies

Network Security Essentials: Applications and Standards

Author: William Stallings

This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography–covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.



Table of Contents:
Ch. 1Introduction1
Ch. 2Symmetric encryption and message confidentiality28
Ch. 3Public-key cryptography and message authentication59
Ch. 4Authentication applications94
Ch. 5Electronic mail security130
Ch. 6IP security177
Ch. 7Web security221
Ch. 8Network management security257
Ch. 9Intruders299
Ch. 10Malicious software332
Ch. 11Firewalls355
App. ASome aspects of number theory381
App. BProjects for teaching network security386

No comments:

Post a Comment