RSA Security's Official Guide to Cryptography - Steve Burnett, Stephen Paine

RSA Security's Official Guide to Cryptography

Buch | Softcover
432 Seiten
2001
McGraw-Hill Professional (Verlag)
978-0-07-213139-0 (ISBN)
54,15 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Helps in implementing cryptography, the most secure form of data encryption. This work, with case studies, is written in conjunction with "RSA Security". It is a part of the "RSA Press Series".
Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security--the most trusted name in e-security(tm). Part of the RSA Press Series.

With degrees in math from Grinnell College in Iowa and The Claremont Graduate School in California, Steve Burnett has spent most of his career converting math into computer programs, first at Intergraph Corporation and now with RSA Security. He is currently the lead crypto engineer for RSA's BSAFE Crypto-C and Crypto-J products, which are general purpose crypto software development kits in C and Java. Burnett is also a frequent speaker at industry events and college campuses. Stephen Paine (San Mateo, CA) is a Systems Engineer at RSA Security where he explains concepts in security to corporations and developers worldwide. Stephen has worked in the security field for most of his career, first working with the security of digital communications and networks for the United States Marine Corps, as a Security Architect at SUN Microsystems, applying Cryptography and security to their ERP financial systems.

Chapter 1: Why Cryptography? Chapter 2: Symmetric-Key Cryptography. Chapter 3: Symmetric-Key Management. Chapter 4: The Key Distribution Problem and Public-Key Cryptography. Chapter 5: The Digital Signature. Chapter 6: Public-Key Infrastructures and the X.509 Standard. Chapter 7: Network and Transport Security Protocols. Chapter 8: Application-Layer Security Protocols. Chapter 9: Hardware Solutions: Overcoming Software Limitations. Chapter 10: Digital Signatures: Beyond Security. Chapter 11: Doing It Wrong: The Break-Ins. Chapter 12: Doing It Right: Following Standards. Appendix A: Bits, Bytes, Hex, and ASCII. Appendix B: A Layman's Guide to a Subset of ASN.1, BER, and DER. Appendix C: Further Technical Details.

Erscheint lt. Verlag 16.4.2001
Zusatzinfo 200 illustrations
Sprache englisch
Maße 185 x 226 mm
Gewicht 930 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 0-07-213139-X / 007213139X
ISBN-13 978-0-07-213139-0 / 9780072131390
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00