Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RSA Security's Official Guide to Cryptography

Buy

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You’ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:

  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

About the Author

Steve Burnett (Research Triangle Park, NC) is a freelance writer and consultant. In addition to contributing to several books in the computer industry, he co-authored the first-edition of the Windows NT & UNIX Integration Guide. Steve holds a M.S. in Technical Communication from North Carolina State University. Stephen Paine (San Mateo, CA) is a Systems Engineer at RSA Security where he explains concepts in security to corporations and developers worldwide. Stephen has worked in the security field for most of his career, first working with the security of digital communications and networks for the United States Marine Corps, as a Security Architect at SUN Microsystems, applying Cryptography and security to their ERP financial systems.
(HTML tags aren't allowed.)

Algorithms in a Nutshell: A Practical Guide
Algorithms in a Nutshell: A Practical Guide

Creating robust software requires the use of efficient algorithms, but programmers seldom think about them until a problem occurs. This updated edition of Algorithms in a Nutshell describes a large number of existing algorithms for solving a variety of problems, and helps you select and implement the right algorithm for your...

Core Java Volume I--Fundamentals (10th Edition) (Core Series)
Core Java Volume I--Fundamentals (10th Edition) (Core Series)

Core Java® has long been recognized as the leading, no-nonsense tutorial and reference for experienced programmers who want to write robust Java code for real-world applications. Now, Core Java®, Volume I–Fundamentals, Tenth Edition, has been extensively updated to reflect the...

Mastering Cloud Computing: Foundations and Applications Programming
Mastering Cloud Computing: Foundations and Applications Programming

Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the...


JavaScript Programming: Pushing the Limits
JavaScript Programming: Pushing the Limits

Take your JavaScript knowledge as far as it can go

JavaScript has grown up, and it's a hot topic. Newer and fasterJavaScript VMs and frameworks built upon them have increased thepopularity of JavaScript for server-side web applications, and richJS applications are being developed for mobile devices. This bookdelivers a...

Discrete and Continuous Fourier Transforms: Analysis, Applications and Fast Algorithms
Discrete and Continuous Fourier Transforms: Analysis, Applications and Fast Algorithms
Long employed in electrical engineering, the discrete Fourier transform (DFT) is now applied in a range of fields through the use of digital computers and fast Fourier transform (FFT) algorithms. But to correctly interpret DFT results, it is essential to understand the core and tools of Fourier analysis. Discrete and Continuous Fourier...
Data Structures and Algorithm Analysis in C++, Third Edition (Dover Books on Computer Science)
Data Structures and Algorithm Analysis in C++, Third Edition (Dover Books on Computer Science)
With its focus on creating efficient data structures and algorithms, this comprehensive text helps readers understand how to select or design the tools that will best solve specific problems. It uses Microsoft C++ as the programming language and is suitable for second-year data structure courses and computer science courses in...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy