User's guide to cryptography and standards
Author(s)
Bibliographic Information
User's guide to cryptography and standards
(Artech House computer security series)
Artech House, c2005
Available at / 6 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Description and Table of Contents
Description
With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for computer/network security practitioners, systems designers, applications developers, and researchers. This timely book delivers the hands-on knowledge professionals need, offering comprehensive coverage on the latest and most-important standardized cryptographic techniques to help them protect their data and computing resources to the fullest. Rather than bogging professionals down with theory like other books on the market, this unique resource describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques. Moreover, practitioners learn how to select standardized techniques that are most suitable for their specific needs.
Table of Contents
Standards and the Standardization Process. Security Mechanisms and Security Services. Encryption. Cryptographic Hash-Functions. Message Authentication Codes (MACs). Digital Signatures. Non-Repudiation Mechanisms. Authentication Protocols. Key Management Framework. Public Key Infrastructures. Trusted Third Party Mechanisms. Cryptographic APIs.
by "Nielsen BookData"