Minecraft Adventures B2G1 Free
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    The Powell's Playlist | August 11, 2015

    Felicia Day: IMG Felicia Day's Playlist for You're Never Weird on the Internet (Almost)



    These songs go along with some of the chapters in my book You're Never Weird on the Internet (Almost). Hope you enjoy! 1. "Sooner or Later" by... Continue »
    1. $18.19 Sale Hardcover add to wish list

    spacer

This item may be
out of stock.

Click on the button below to search for this title in other formats.


Check for Availability
Add to Wishlist

RSA Security's Official Guide to Cryptography

RSA Security's Official Guide to Cryptography Cover

 

Synopses & Reviews

Publisher Comments:

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You?ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:


  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

Synopsis:

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You?ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:

  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

Product Details

ISBN:
9780072131390
Author:
Burnett, Steve
Author:
Paine, Stephen
Author:
Paine, Steve
Publisher:
McGraw-Hill Osborne Media
Subject:
Networking - General
Subject:
Computer networks
Subject:
Internet - Security
Subject:
Security
Subject:
Cryptography
Publication Date:
20010329
Binding:
TP
Language:
English
Illustrations:
Y
Pages:
419
Dimensions:
9.08x7.42x1.23 in. 2.03 lbs.

Related Subjects

Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » Cryptography
Computers and Internet » Networking » General

RSA Security's Official Guide to Cryptography
0 stars - 0 reviews
$ In Stock
Product details 419 pages McGraw-Hill Osborne Media - English 9780072131390 Reviews:
"Synopsis" by , Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You?ll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.

This book will show you how to:

  • Distinguish different types of symmetric-key encryption algorithms and know where each is best used
  • Find out how password-based encryption works
  • Communicate safely over unsecure channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more

Improve security and protect your company's information with the most authoritative guide to cryptography available.

spacer
spacer
  • back to top

FOLLOW US ON...

       
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.