Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, code signing, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.
"Sinopsis" puede pertenecer a otra edición de este libro.
Section 1: INFORMATION & SECURITY PLANNING. Introduction to Information Theory. Threat Agents & Risk. Information & The Law. A Model for Information Security Planning. Section 2: CRYPTOGRAPHIC PRINCIPLES AND METHODS. Cryptographic Philosophy. Mathematical Principles of Cryptography. Symmetrical Key Cryptography. Public Key Infrastructure. Section 3: INFORMATION SYSTEM SECURITY. Securing The Information System. Viruses & Worms. Securing the Digital Marketplace.
Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is presented and explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.
"Sobre este título" puede pertenecer a otra edición de este libro.
GRATIS gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoGRATIS gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoLibrería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.1. Nº de ref. del artículo: G1401837271I3N00
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.1. Nº de ref. del artículo: G1401837271I3N00
Cantidad disponible: 1 disponibles
Librería: The Book Spot, Sioux Falls, MN, Estados Unidos de America
Paperback. Condición: New. Nº de ref. del artículo: Abebooks442287
Cantidad disponible: 1 disponibles