Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RSA Security's Official Guide to Cryptography


Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You’ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:

  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

About the Author

Steve Burnett (Research Triangle Park, NC) is a freelance writer and consultant. In addition to contributing to several books in the computer industry, he co-authored the first-edition of the Windows NT & UNIX Integration Guide. Steve holds a M.S. in Technical Communication from North Carolina State University. Stephen Paine (San Mateo, CA) is a Systems Engineer at RSA Security where he explains concepts in security to corporations and developers worldwide. Stephen has worked in the security field for most of his career, first working with the security of digital communications and networks for the United States Marine Corps, as a Security Architect at SUN Microsystems, applying Cryptography and security to their ERP financial systems.
(HTML tags aren't allowed.)

Powerful PowerPoint for Educators: Using Visual Basic for Applications to Make PowerPoint Interactive
Powerful PowerPoint for Educators: Using Visual Basic for Applications to Make PowerPoint Interactive
With clear, concise, step-by-step instructions on how to create presentations, users can create multiple-choice tests that not only give feedback, but also keep score....This is a powerful tool for educators to have in their repertoire....This book will encourage PowerPoint users to push their skills beyond the status quo.

Learn to
Developing Java Servlets (2nd Edition)
Developing Java Servlets (2nd Edition)

Before you begin reading this book, you might want to take a look at its basic structure. This will help you outline your reading plan, if you choose not to read it from cover to cover. This introduction gives you an overview of what each chapter covers.

Developing Java Servlets, Second Edition, is a comprehensive,...

Mastery of Cardiothoracic Surgery, 2e
Mastery of Cardiothoracic Surgery, 2e

Completely revised and updated, with 38 new contributing authors, the Second Edition of this standard-setting text/atlas from the acclaimed Mastery of Surgery series is a comprehensive guide to all cardiothoracic surgical procedures for adults and children. More than 130 of the world's master surgeons describe their...

Critical Chain Project Management (Artech House Professional Development Library)
Critical Chain Project Management (Artech House Professional Development Library)
Plan and manage projects that yield successful results all the time in half the time you?re used to with this new guide. Providing the theory, tools and techniques you need to implement critical chain project management in your organization, you learn how to reduce stress on a project team, eliminate cost and scheduling over-runs, effectively...
Autodesk Revit Architecture 2015 Essentials: Autodesk Official Press
Autodesk Revit Architecture 2015 Essentials: Autodesk Official Press

Your step-by-step guide to learning Autodesk Revit Architecture

This detailed introduction to Revit Architecture features straightforward explanations and real-world, hands-on tutorials to teach new users the software's core features and functions.

Presented in the context of real-world workflows, and using...

Horace Poolaw, Photographer of American Indian Modernity
Horace Poolaw, Photographer of American Indian Modernity

Laura E. Smith unravels the compelling life story of Kiowa photographer Horace Poolaw (1906–84), one of the first professional Native American photographers. Born on the Kiowa reservation in Anadarko, Oklahoma, Poolaw bought his first camera at the age of fifteen and began taking photos of family, friends, and noted leaders in...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy