Saturday, April 4, 2009

RSA Security's Official Guide to Cryptography


Steve Burnett, Stephen Paine, "RSA Security's Official Guide to Cryptography"
McGraw-Hill Osborne Media | 2001 | ISBN: 007213139X | 419 pages | PDF | 8,7 MB

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.
This book will show you how to:
*Distinguish different types of symmetric-key encryption algorithms and know where each is best used
*Find out how password-based encryption works
*Communicate safely over unsecure channels using public-key technology
*Use public-key technology for authentication and non-repudiation
*Get details on current PKI standards and technology--including vendor information
*Understand X.509 certificates and directory structures
*Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
*Recognize how corporations use cryptography to improve security through real-world case studies
*View cryptography from different perspectives--corporations, developers, and users
*Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more
Improve security and protect your company's information with the most authoritative guide to cryptography available.

Download:
Link_1
.

0 comments:

Post a Comment | Feed

Post a Comment



Related Posts with Thumbnails
 

Blog Archive

Recent Posts

  © Free E-Books U ask v provide by Free E-Books Download 2012

Disclaimer: This blog does not store any files on its server.We only index and link to content provided by sites.

USER AGREEMENT PLEASE READ : The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These links here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. If you want to remove links to your website, Please send an email to professionalstudents[at]gmail[dot]com.