Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Security: Cryptographic Principles, Algorithms and Protocols

Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. This book takes a long-term view. It is not a 'how-to' implementation guide for today's practitioners. It is a training text for the engineers of the future.


  • Detailed discussion of block cipher design principles, including coverage of IDEA, RC5, RC6, Triple DES and Advanced Encryption Standard (AES)
  • Information on hash functions and message digests, including the latest protocols for digital signature, authentication and key-sharing HMAC.
  • Expanded coverage of public-key encryption/signature algorithms, including Diffie-Hellman secret key exchange, RSA, ElGamal, Schnorr, DSA and Elliptic Curve Cryptography (ECC)
  • Profiles for Public Key Infrastructure (PKI)
  • Complete and detailed guides to the entire TCP/IP protocol suite
  • IPsec for network-layer security
  • PGP and S/MIME for e-mail security
  • SSL/TLS for transport-layer security
  • Firewalls for trusted systems
  • SET security protocols used in the smart card
As well as providing an in-depth introduction to relevant cryptographic principles, algorithms and protocols, Internet Security links them to the technologies in use on the Internet today. State-of-the-art analyses of IETF standards plus summaries and explanations of RFC documents, numerous examples and a list of frequently used acronyms make this book a comprehensive and valuable reference for students, researchers and professional engineers alike - anyone engaged in the long-term development of secure systems.
(HTML tags aren't allowed.)

Objective C Memory Management Essentials
Objective C Memory Management Essentials

Learn and put into practice various memory management techniques in Objective-C to create robust iOS applications

About This Book

  • Learn about the concepts of memory management in Objective-C
  • Get introduced to Swift, an innovative new programming language for Cocoa and Cocoa Touch
  • ...
iPod & iTunes  For Dummies
iPod & iTunes For Dummies
Connect your iPod or iPod mini to your Mac or PC

Here's just what you need to know to have music wherever you go!

Music is the language of love, and now both Mac and Windows lovers can jam with iPod! This handy guide shows you how to set up your iPod, load songs (legally), edit playlists, find your way around the iTunes music...

The Complete Idiot's Guide to the Art of Seduction
The Complete Idiot's Guide to the Art of Seduction
You're no idiot, of course. You've heard that oysters are a great aphrodisiac, know that everybody looks better in candlelight, and can wink without making it look like something got caught in your eye. But when it comes to putting these talents together and seducing the one you want, you feel like cupid without a bow and arrow. Don't hang up...

Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software
Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software

In the early days, embedded systems were built primarily by engineers in a pretty exclusive club. Embedded devices and software tools were expensive, and building a functional prototype required significant software engineering and electrical engineering experience.

With the arrival of Arduino, the open source electronics...

Well-Posed Linear Systems (Encyclopedia of Mathematics and its Applications)
Well-Posed Linear Systems (Encyclopedia of Mathematics and its Applications)
This main purpose of this book is to present the basic theory of well-posed
linear systems in a form which makes it available to a larger audience, thereby
opening up the possibility of applying it to a wider range of problems. Up to
now the theory has existed in a distributed form, scattered between different
papers with
Networking For Dummies
Networking For Dummies
Company just hooked you up to a network and you’re wondering what the heck you’re supposed to do with it? Tired of burning spreadsheets onto CDs just so you can share them with coworkers, and you’re wondering what it’ll take to set up a network in your organization? Been tasked with setting up a network and you don’t...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy