Autor: Niels Ferguson, Bruce Schneier
Wydawca: Wiley
Dostępność: 3-6 tygodni
Cena: 236,25 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780471223573 |
ISBN10: |
0471223573 |
Autor: |
Niels Ferguson, Bruce Schneier |
Oprawa: |
Paperback |
Rok Wydania: |
2003-04-15 |
Ilość stron: |
432 |
Wymiary: |
235x189 |
Tematy: |
URY |
Two of the worlds top experts in cryptography teach you how to secure your digital future
In todays world, security is a top concern for businesses worldwide. Without a secure computer system, you dont make money, you dont expand, andbottom lineyou dont survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real–world systems. With Practical Cryptography, an author team of international renown provides you with the first hands–on cryptographic product implementation guide, bridging the gap between cryptographic theory and real–world cryptographic applications.
This follow–up guide to the bestselling Applied Cryptography dives in and explains the how–to of cryptography. Youll find discussions on: Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signaturesImplementing cryptographic algorithms and systems in a secure way on todays computersA consistent design philosophy to ensure that every part of the system achieves the required security levelWhy security affects every part of the system, and why it has to be a primary goal of the projectHow simple interfaces for cryptographic primitives reduce system complexity and increase system security
Spis treści:
Preface.
1. Our Design Philosophy.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie–Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.
Nota biograficzna:
NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large–scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.
BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed–security monitoring company. A world–renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).
Okładka tylna:
Two of the worlds top experts in cryptography teach you how to secure your digital future
In todays world, security is a top concern for businesses worldwide. Without a secure computer system, you dont make money, you dont expand, andbottom lineyou dont survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real–world systems. With Practical Cryptography, an author team of international renown provides you with the first hands–on cryptographic product implementation guide, bridging the gap between cryptographic theory and real–world cryptographic applications.
This follow–up guide to the bestselling Applied Cryptography div
es in and explains the how–to of cryptography. Youll find discussions on: Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signaturesImplementing cryptographic algorithms and systems in a secure way on todays computersA consistent design philosophy to ensure that every part of the system achieves the required security levelWhy security affects every part of the system, and why it has to be a primary goal of the projectHow simple interfaces for cryptographic primitives reduce system complexity and increase system security
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy