Cryptographic Principles, Algorithms and Protocols
Book Details:
Pages: | 424 |
Published: | Apr 02 2003 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 4.59 MB |
Book Description:
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system.However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work.Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer "if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time". This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems.Internet Security:* Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols - the nuts and bolts of creating a secure network* Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions)* Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents* Authored by a recognised expert in securityInternet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems.
3rd Edition
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book con...
A Jumpstart for Systems Administrators and IT Managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
Shield data f...
Administrator's Pocket Consultant
Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA Server 2004. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the focused, straightforward information you need to solve problems and get the job done?whether you're at your desk or in the field! Get fast facts to:Install and configure ISA Server 2004 Upgrade from ISA Server 2000 Use scripts to automate recurring tasks Administer firewall, Web proxy, and SecureNAT clients Define networks and manage access policies and publishing rules Implement a multi-networking environment Set up VPNs and perimeter networks Configure ISA Server security features and detect intrusions Monitor...
2007 - 2021 © eBooks-IT.org