Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
RSA Security's Official Guide to Cryptography
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

RSA Security's Official Guide to Cryptography

RSA Security's Official Guide to Cryptography

Steve Burnett, Stephen Paine

419 pages, parution le 15/04/2001

Résumé

Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques in RSA Security's Official Guide to Cryptography. This expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks. This book will help you:
  • Understand the workings of password-based encryption
  • Communicate safely over unsecured channels using public-key technology
  • Use public-key technology for authentication and non-repudiation
  • Get details on current PKI standards and technology--including vendor information
  • Understand X.509 certificates and directory structures
  • Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
  • Recognize how corporations use cryptography to improve security through real-world case studies
  • View cryptography from different perspectives--corporations, developers, and users
  • Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more
Content
  • Chapter 1: Why cryptography ?
  • Chapter 2: Symmetric-Key Cryptography
  • Chapter 3: File Encryption, Password-Based Encryption and the Password
  • Chapter 4: The Key Distribution Problem
  • Chapter 5: Public-Key Cryptography
  • Chapter 6: Digital Signatures and Data Integrity
  • Chapter 7: PKI and X509 Directories
  • Chapter 8: Putting This All Together: Implementation of X509 Certificates within Protocol
  • Chapter 9: Putting This All Together: Other Protocols Widely Used
  • Chapter 10: Case Studies: Companies Doing It Right and the Standards They Followed
  • Chapter 11: Case Studies: The Break-Ins
  • Chapter 12: The Digital Signature Beyond Security
  • Chapter 13: Hardware Solutions: Getting Away from Software Limitations

L'auteur - Steve Burnett

a member of USENIX and SAGE, is a freelance writer and networking consultant. David Gunter is an information technology consultant and author. Lola Gunter is a technical consultant working in web and multimedia software development. The three are the co-authors of Windows NT & UNIX Integration Guide.

L'auteur - Stephen Paine

Stephen Paine has worked in the security field throughout most of his career-formerly for the United States Marine Corps and SUN Microsystems. He is currently a systems engineer for RSA Security, where he explains security concepts to corporations and developers worldwide and provides training to customers and RSA employees.

Caractéristiques techniques

  PAPIER
Éditeur(s) Mc Graw Hill
Auteur(s) Steve Burnett, Stephen Paine
Parution 15/04/2001
Nb. de pages 419
Format 18,7 x 23,2
Couverture Broché
Poids 922g
Intérieur Noir et Blanc
EAN13 9780072131390

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription