Cryptography for Dummies

Chey Cobb

  • 出版商: Hungry Minds
  • 出版日期: 2004-01-30
  • 售價: $1,580
  • 貴賓價: 9.5$1,501
  • 語言: 英文
  • 頁數: 336
  • 裝訂: Paperback
  • ISBN: 0764541889
  • ISBN-13: 9780764541889
  • 相關分類: 資訊安全
  • 已過版

買這商品的人也買了...

相關主題

商品描述

* Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
* This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
* Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
* Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately
* Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies

Table of Contents

Introduction.

Part I: Crypto Basics & What You Really Need to Know.

Chapter 1: A Primer on Crypto Basics.

Chapter 2: Major League Algorithms.

Chapter 3: Deciding What You Really Need.

Chapter 4: Locks and Keys.

Part II: Public Key Infrastructure.

Chapter 5: The PKI Primer.

Chapter 6: PKI Bits and Pieces.

Chapter 7: All Keyed Up!

Part III: Putting Encryption Technologies to Work for You.

Chapter 8: Securing E-Mail from Prying Eyes.

Chapter 9: File and Storage Strategies.

Chapter 10: Authentication Systems.

Chapter 11: Secure E-Commerce.

Chapter 12: Virtual Private Network (VPN) Encryption.

Chapter 13: Wireless Encryption Basics.

Part IV: The Part of Tens.

Chapter 14: The Ten Best Encryption Web Sites.

Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms.

Chapter 16: Cryptography Do’s and Don’ts.

Chapter 17: Ten Principles of “Cryptiquette”.

Chapter 18: Ten Very Useful Encryption Products.

Part V: Appendixes.

Appendix A: Cryptographic Attacks.

Appendix B: Glossary.

Appendix C: Encryption Export Controls.

Index.