Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RSA Security's Official Guide to Cryptography

Buy

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You’ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:

  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

About the Author

Steve Burnett (Research Triangle Park, NC) is a freelance writer and consultant. In addition to contributing to several books in the computer industry, he co-authored the first-edition of the Windows NT & UNIX Integration Guide. Steve holds a M.S. in Technical Communication from North Carolina State University. Stephen Paine (San Mateo, CA) is a Systems Engineer at RSA Security where he explains concepts in security to corporations and developers worldwide. Stephen has worked in the security field for most of his career, first working with the security of digital communications and networks for the United States Marine Corps, as a Security Architect at SUN Microsystems, applying Cryptography and security to their ERP financial systems.
(HTML tags aren't allowed.)

Practical Tableau: 100 Tips, Tutorials, and Strategies from a Tableau Zen Master
Practical Tableau: 100 Tips, Tutorials, and Strategies from a Tableau Zen Master

Whether you have some experience with Tableau software or are just getting started, this manual goes beyond the basics to help you build compelling, interactive data visualization applications. Author Ryan Sleeper, one of the world’s most qualified Tableau consultants, complements his web posts and instructional videos with...

Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course is a fast-paced, thorough introduction to Python that will have you writing programs, solving problems, and making things that work in no time.

In the first half of the book, you’ll learn about basic programming concepts, such as lists, dictionaries, classes, and loops, and practice writing
...
Everyone Needs a Mentor: Fostering Talent in Your Organisation
Everyone Needs a Mentor: Fostering Talent in Your Organisation
Mentoring is the most cost-efficient and sustainable method of developing talent within an organization. This book shows how set up, run and maintain a mentoring program, from selecting and matching mentors and mentees to measuring results.

You can use mentoring to: stretch talented employees to perform even better by exposure to high
...

Python Essential Reference (3rd Edition) (Developer's Library)
Python Essential Reference (3rd Edition) (Developer's Library)

Python Essential Reference, Second Edition, is the definitive guide to the Python programming language. Designed for programmers, it covers the core language, more than 100 modules in the standard library, and the techniques used to extend Python with compiled procedures in C or C++. Coverage expands upon and clarifies existing Python...

Subclassing and Hooking with Visual Basic
Subclassing and Hooking with Visual Basic

Subclassing & Hooking with Visual Basic offers developers a unique way to customize Windows behavior.

Windows is a message-based system. Every action you request creates one or more messages to carry out the action. These messages are passed between objects and carry with them information that gives the...

Centrifugal Pumps
Centrifugal Pumps

This handbook summarizes the research results on hydraulic problems in centrifugal pump design and describes the state of the art in a comprehensive way. For this 4th edition, current research results of practical relevance were included. The selection and presentation of the material was oriented towards the needs of pump...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy