User's guide to cryptography and standards
Material type:
TextLanguage: English Series: Artech House computer security libraryPublication details: Boston Artech House 2004Description: xv, 382 p. illISBN: - 1580535305 (HB)
BOOKS
| Home library | Call number | Materials specified | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|
| IMSc Library | 681 DUN (Browse shelf(Opens below)) | Available | 53160 |
Includes index
Includes bibliographical references
1. Introduction 2. Standards and the standardization process 3. Security mechanisms and security services 4. Encryption 5. Modes of operation for block ciphers 6. Cryptographic hash functions 7. Message authentication codes (MACs) 8. Digital signatures 9. Non-repudiation mechanisms 10. Authentication protocols 11. Key management frameworks 12. Key establishment mechanisms 13. Public key infrastructures 14. Trusted third parties 15. Cryptographic APIs 16. Other standards 17. Standards : the future.
ith the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers hands-on knowledge of the latest and most important standardized cryptographic techniques that professionals can use to protect data and computing resources to the fullest. Rather than focusing on theory like other books, this resource describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques.
There are no comments on this title.