RSA Security's Official Guide to Cryptography
Résumé
- Understand the workings of password-based encryption
- Communicate safely over unsecured channels using public-key technology
- Use public-key technology for authentication and non-repudiation
- Get details on current PKI standards and technology--including vendor information
- Understand X.509 certificates and directory structures
- Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
- Recognize how corporations use cryptography to improve security through real-world case studies
- View cryptography from different perspectives--corporations, developers, and users
- Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more
- Chapter 1: Why cryptography ?
- Chapter 2: Symmetric-Key Cryptography
- Chapter 3: File Encryption, Password-Based Encryption and the Password
- Chapter 4: The Key Distribution Problem
- Chapter 5: Public-Key Cryptography
- Chapter 6: Digital Signatures and Data Integrity
- Chapter 7: PKI and X509 Directories
- Chapter 8: Putting This All Together: Implementation of X509 Certificates within Protocol
- Chapter 9: Putting This All Together: Other Protocols Widely Used
- Chapter 10: Case Studies: Companies Doing It Right and the Standards They Followed
- Chapter 11: Case Studies: The Break-Ins
- Chapter 12: The Digital Signature Beyond Security
- Chapter 13: Hardware Solutions: Getting Away from Software Limitations
L'auteur - Steve Burnett
a member of USENIX and SAGE, is a freelance writer and
networking consultant. David Gunter is an information
technology consultant and author. Lola Gunter is a
technical consultant working in web and multimedia software
development. The three are the co-authors of Windows NT
& UNIX Integration Guide.
L'auteur - Stephen Paine
Stephen Paine has worked in the security field throughout most of his career-formerly for the United States Marine Corps and SUN Microsystems. He is currently a systems engineer for RSA Security, where he explains security concepts to corporations and developers worldwide and provides training to customers and RSA employees.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Steve Burnett, Stephen Paine |
Parution | 15/04/2001 |
Nb. de pages | 419 |
Format | 18,7 x 23,2 |
Couverture | Broché |
Poids | 922g |
Intérieur | Noir et Blanc |
EAN13 | 9780072131390 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse