Skip to content
Scan a barcode
Scan
Added to your cart

Making the Team: A Guide for Managers, Instructor's Manual

No Synopsis Available.

Recommended

Format: Paperback

Temporarily Unavailable

We receive fewer than 1 copy every 6 months.

Related Subjects

Engineering Technology

Customer Reviews

0 customer rating | 0 review

Rated 5 stars
A great book got even better

The second edition of this witty and informative book on network security is even better than the first edition and is clearly the best book on the subject currently available. Secret and public key algorithms and protocols, message hashes, authentication, Kerberos, PKI, IPsec, SSL/TLS, and e-mail security are all explained at length. Chapter 26 on security folklore is a real gem. In security, the devil is in the details...

0Report

Rated 5 stars
Explains tedious theory in an understandable way

I took this book along on a business trip with the expectation that it would work better than chamomile tea before bed -- instead it kept me up well into the night. It turns a, necessarily, tedious subject into compelling reading. A "must-read" and "must-have" reference for any person charged with managing a distributed computing environment.

0Report

Rated 5 stars
Comprehensive and written in plain english

Far and away the best book on network security and basic cryptography. This book is very well written and contains a number of simple examples to explain even the most complex theory. This is so far the only crypto book I've been able to read cover-to-cover more than once without pulling my hair out. Its not as deep on many topics as the Schneier or Stallings books. But if you buy one security/crypto book, buy this...

0Report

Rated 5 stars
Recommended reading for distributed system programmers

This book has one of the most comprehensible explanations of network authentication protocols (including Kerberos V) that I've seen. The authors demonstrate intimate knowledge of the subject material, but they restrain themselves from simply performing a brain dump on the reader. Rather they include historical and personal footnotes that make the story witty and memorable, and give context to the topic at hand. Definitely...

0Report

Rated 5 stars
The best book currently available on network security

As electronic commerce, home banking, and similar network applications become commonplace, network security will be absolutely essential to ensuring the privacy of all the users. In this book the authors explain how network security works, starting with the basic ideas and working up to numerous state-of-the-art subjects. For readers who want to know all about the mathematical fundementals of cryptography, there is...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured