|
|
|
|
Implementing SSL / TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or... | | XML Security Keep XML applications and documents secure with help from the leading authority in e-security
Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management... | | |
|
|
|
Internet & Intranet SecurityThis extensively revised, new edition of the 1998 Artech House classic, Internet and Intranet Security, offers you an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall... | | Concurrent Zero-Knowledge: With Additional Background by Oded GoldreichZero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory definition; zero-knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their applicability in the domain of cryptography is vast.
A fundamental question... | | Cryptography Demystified
Works through 35 cryptography modules supported by exercises and answers
This first part comprises thirteen modules. These modules will
familiarize you with some of the important terms and concepts of
cryptography in general and symmetric of one-key cryptography in specific.
Symmetric cryptography is the ... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |