Résumé
Two of the world's top experts in cryptography teach you how to secure your digital future In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and–bottom line–you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.
This follow-up guide to the bestselling Applied
Cryptography dives in and explains the how-to of
cryptography.
You'll find discussions on:
- Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
- Implementing cryptographic algorithms and systems in a secure way on today's computers
- A consistent design philosophy to ensure that every part of the system achieves the required security level
- Why security affects every part of the system, and why it has to be a primary goal of the project
- How simple interfaces for cryptographic primitives reduce system complexity and increase system security
Contents
Part I: Security Fundamentals- Chapter 1: Security Threats
- Chapter 2: Network and System Security Overview
- Chapter 3: Security Architecture Planning
- Chapter 4: Basic Security Auditing
- Chapter 5: Windows Server 2003 Security Provisions
- Chapter 6: Securing Windows Server 2003
- Chapter 7: Securing Applications
- Chapter 8: Encrypting Your Data
- Chapter 9: Securing Web Pages and E-mail Using SSL and TLS
- Chapter 10: Windows Server 2003 Authentication
- Chapter 11: Kerberos
- Chapter 12: Public Key Infrastructure Overview
- Chapter 13: Installing and Configuring Certificate Services
- Chapter 14: L2TP and PPTP VPNs
- Chapter 15: IPSec
- Chapter 16: ISA Server Overview
- Chapter 17: Installing and Configuring a Firewall
- Chapter 18: Configuring the Acceleration Service
- Appendix A: Security Tools
- Appendix B: Security Resources
- Appendix C: Standard TCP/IP Port Assignments
- Index
L'auteur - Niels Ferguson
is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large-scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Niels Ferguson |
Parution | 02/05/2003 |
Nb. de pages | 410 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 640g |
Intérieur | Noir et Blanc |
EAN13 | 9780471223573 |
ISBN13 | 978-0-471-22357-3 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse