Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RSA Security's Official Guide to Cryptography

Buy

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You’ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:

  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

About the Author

Steve Burnett (Research Triangle Park, NC) is a freelance writer and consultant. In addition to contributing to several books in the computer industry, he co-authored the first-edition of the Windows NT & UNIX Integration Guide. Steve holds a M.S. in Technical Communication from North Carolina State University. Stephen Paine (San Mateo, CA) is a Systems Engineer at RSA Security where he explains concepts in security to corporations and developers worldwide. Stephen has worked in the security field for most of his career, first working with the security of digital communications and networks for the United States Marine Corps, as a Security Architect at SUN Microsystems, applying Cryptography and security to their ERP financial systems.
(HTML tags aren't allowed.)

Biochemistry (2 volume set): The Chemical Reactions of Living Cells, Second Edition
Biochemistry (2 volume set): The Chemical Reactions of Living Cells, Second Edition
An incomparable, up-to-date reference for basic biochemistry, associated chemistry, and underlying biological phenomena.

Biochemistry: The Chemical Reactions of Living Cells is a well-integrated, up-to-date reference for basic biochemistry, associated chemistry, and underlying biological phenomena. Biochemistry is a
...
Design Criteria for Low Distortion in Feedback Opamp Circuits
Design Criteria for Low Distortion in Feedback Opamp Circuits
    Broadband opamps for multi-channel communication systems have strong demands on linearity performance. When these opamps are integrated in deep sub-micron CMOS technologies, the signal-swing has to occupy a large part of the rather low supply voltage to maintain the signal-to-noise-ratio. To obtain opamps with low distortion it...
Sams Teach Yourself Perl in 24 Hours (3rd Edition)
Sams Teach Yourself Perl in 24 Hours (3rd Edition)
Even if you're new to Perl, Sams Teach Yourself Perl in 24 Hours teaches you everything you need to know to begin producing useful CGI programs quickly. This book provides you with a solid foundation in the basics of the Perl language, so you can easily move on to more advanced books and techniques. Special attention is paid to those features that...

Net Neutrality or Net Neutering: Should Broadband Internet Services Be Regulated
Net Neutrality or Net Neutering: Should Broadband Internet Services Be Regulated
Most of the papers in this book were originally presented at a June 2003 Progress & Freedom Foundation conference entitled, "Net Neutrality or Net Neutering: Should Broadband Internet Services Be Regulated." As we now publish the suitably updated collection of papers, along with two others, the title remains entirely appropriate. For...
Designing for the Social Web
Designing for the Social Web
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the right design strategy you can use this social interaction...
Internet-based Control Systems: Design and Applications (Advances in Industrial Control)
Internet-based Control Systems: Design and Applications (Advances in Industrial Control)

The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.

Internet-based Control Systems...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy