Doesn't suit? No problem! You can return within 30 days
You won't go wrong with a gift voucher. The gift recipient can choose anything from our offer.
30-day return policy
This unique book explores the use of cryptographic techniques in authentication and key distribution systems. Systems such as Kerberos, NetSP, SPX, TESS, and SESAME are analyzed and compared. Computer scientists, electrical engineers, networking specialists, and information technology professionals learn valuable cryptographic techniques--and why authentication and key distribution systems are likely to become the primary means for securing networks and distributed systems in the future.