Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cryptology and Web Security

Buy
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.

The transfer of information over the world wide web depends critically on secure communications. The need to protect the material we send and receive from cyberspace, from the largest of business transactions to the simplest of personal web-pages, is crucial in ensuring we can continue to use this incredible resource safely. Cryptology provides the most reliable tools for storing or transmitting digital information and is the gold standard for attaining the levels of security our online interactions demand. 

Taking a step-by-step approach P. K. Yuen demonstrates how to master practical encryption/decryption algorithms, implementation techniques, and web-based security skills including:

·        Protecting websites from hackers and viruses;

·        Encrypting email, Web pages, and instant messages;

·        Building a secure web-database;

·        Performing secure business transactions over the web.

Working from a problem-solving perspective, he shows how to implement security solutions and looks from the attacker’s point of view at possible challenges to that security. In short, Practical Cryptology and Web Security offers a practical and comprehensive guide to all aspects of web security.

Features
  • Over 120 worked examples, many from industry, demonstrate the key considerations in implementing web security.
  • Covers all the major encryption techniques and standards, including the AES.
  • Examines the latest web technologies in terms of security, including XML Signatures and XML Digital Contracts
PK Yuen is a well known expert on Communications, Internet and the World Wide Web. He has over 13 years’ experience working on web technologies including large scale application developments, engineer training, project leadership and working on the security systems of international airports. He is co-author of Practical Web Technologies, also published by Addison-Wesley.

 

(HTML tags aren't allowed.)

Introduction to Systems Analysis & Design
Introduction to Systems Analysis & Design
Introduction to Systems Analysis and Design is intended to support a fi rst course in information systems development for information systems majors and other business majors.

We recommend that students take a computer or information systems literacy course before using this text. Introduction to Systems Analysis
...
Subband Adaptive Filtering: Theory and Implementation
Subband Adaptive Filtering: Theory and Implementation

Subband adaptive filtering is rapidly becoming one of the most effective techniques for reducing computational complexity and improving the convergence rate of algorithms in adaptive signal processing applications. This book provides an introductory, yet extensive guide on the theory of various subband adaptive filtering techniques. For...

Developing Visual Basic Add-ins: The VB IDE Extensibility Model
Developing Visual Basic Add-ins: The VB IDE Extensibility Model

Most developers can think of dozens of ways in which they'd like to modify Visual Basic's integrated development environment (or IDE) in order to work more productively. These enhancements can range from simple items (like determining the version of Visual Basic for Applications used by the IDE, or clearing the Immediate...


Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease

Enhance the power of NumPy and start boosting your scientific computing capabilities

Key Features

  • Grasp all aspects of numerical computing and understand NumPy
  • Explore examples to learn exploratory data analysis (EDA), regression, and clustering
  • Access...
3D Imaging for Safety and Security (Computational Imaging and Vision)
3D Imaging for Safety and Security (Computational Imaging and Vision)
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security...
Hibernate: A Developer's Notebook
Hibernate: A Developer's Notebook

Hibernate is a lightweight object/relational mapping service for Java. What does that mean? It's a way to easily and efficiently work with information from a relational database in the form of natural Java objects. But that description doesn't come close to conveying how useful and exciting the technology is. I'm not the only...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy