 
                    RSA Security's Official Guide to Cryptography
Résumé
- Understand the workings of password-based encryption
- Communicate safely over unsecured channels using public-key technology
- Use public-key technology for authentication and non-repudiation
- Get details on current PKI standards and technology--including vendor information
- Understand X.509 certificates and directory structures
- Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
- Recognize how corporations use cryptography to improve security through real-world case studies
- View cryptography from different perspectives--corporations, developers, and users
- Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more
- Chapter 1: Why cryptography ?
- Chapter 2: Symmetric-Key Cryptography
- Chapter 3: File Encryption, Password-Based Encryption and the Password
- Chapter 4: The Key Distribution Problem
- Chapter 5: Public-Key Cryptography
- Chapter 6: Digital Signatures and Data Integrity
- Chapter 7: PKI and X509 Directories
- Chapter 8: Putting This All Together: Implementation of X509 Certificates within Protocol
- Chapter 9: Putting This All Together: Other Protocols Widely Used
- Chapter 10: Case Studies: Companies Doing It Right and the Standards They Followed
- Chapter 11: Case Studies: The Break-Ins
- Chapter 12: The Digital Signature Beyond Security
- Chapter 13: Hardware Solutions: Getting Away from Software Limitations
L'auteur - Steve Burnett
a member of USENIX and SAGE, is a freelance writer and
networking consultant. David Gunter is an information
technology consultant and author. Lola Gunter is a
technical consultant working in web and multimedia software
development. The three are the co-authors of Windows NT
& UNIX Integration Guide.
 
L'auteur - Stephen Paine
Stephen Paine has worked in the security field throughout most of his career-formerly for the United States Marine Corps and SUN Microsystems. He is currently a systems engineer for RSA Security, where he explains security concepts to corporations and developers worldwide and provides training to customers and RSA employees.
Caractéristiques techniques
| PAPIER | |
| Éditeur(s) | Mc Graw Hill | 
| Auteur(s) | Steve Burnett, Stephen Paine | 
| Parution | 15/04/2001 | 
| Nb. de pages | 419 | 
| Format | 18,7 x 23,2 | 
| Couverture | Broché | 
| Poids | 922g | 
| Intérieur | Noir et Blanc | 
| EAN13 | 9780072131390 | 
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
 
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
                     
                     
                    