RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.
By: Burnett, Steve.
Contributor(s): Paine, Stephen | RSA Security.
Material type: BookPublisher: New York : Osborne/McGraw-Hill, 2001Description: xxi, 419 p. : ill. ; 24 cm. + pbk.ISBN: 007213139X.Other title: Official guide to cryptography.Subject(s): Computer networks -- Security measures | Data encryption (Computer science) | CryptographyDDC classification: 005.82Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
General Lending | MTU Bishopstown Library Lending | 005.82 (Browse shelf(Opens below)) | 1 | Available | 00092135 |
Enhanced descriptions from Syndetics:
Cryptography can help keep hackers from altering a Website and protect confidential documents at work.
RSA Press--cover.
Includes index.
Why cryptography? -- Symmetric-key cryptography -- Symmetric-key management -- The key distribution problem and public-key cryptography -- The digital signature -- Public-key infrastructures and the X.509 standard -- Network and transport security protocols -- Application-layer security protocols -- Hardware solutions: overcoming software limitations -- Digital signatures: beyond security -- Doing it wrong: The break-ins -- Doing it right: following standards
Table of contents provided by Syndetics
- Foreword (p. v)
- Chapter 1 Why Cryptography? (p. 1)
- Security Provided by Computer Operating Systems (p. 2)
- How Operating Systems Work (p. 2)
- Default OS Security: Permissions (p. 3)
- Attacks on Passwords (p. 4)
- Attacks That Bypass Operating Systems (p. 6)
- Data Recovery Attack (p. 6)
- Memory Reconstruction Attack (p. 9)
- Added Protection Through Cryptography (p. 11)
- The Role of Cryptography in Data Security (p. 12)
- Chapter 2 Doing It Wrong: The Break-Ins (p. 15)
- Measuring Losses (p. 15)
- Types of Security Threats (p. 16)
- Unauthorized Disclosure of Data (p. 17)
- Unauthorized Modification of Data (p. 17)
- Unauthorized Access (p. 18)
- Disclosure of Network Traffic (p. 19)
- Spoofing of Network Traffic (p. 20)
- Identifying Intruders (p. 20)
- Insiders (p. 21)
- Hackers (p. 21)
- Terrorists (p. 21)
- Foreign Intelligence Services (p. 22)
- Hactivists (p. 22)
- Intruder Knowledge (p. 23)
- Case Studies (p. 23)
- Data in Transit (p. 23)
- Data at Rest (p. 24)
- Authentication (p. 25)
- Implementation (p. 26)
- Information Security: Law Enforcement (p. 27)
- Summary (p. 28)
- Chapter 3 Doing It Right: Following Standards (p. 29)
- Security Services and Mechanisms (p. 30)
- Authentication (p. 30)
- Confidentiality (p. 32)
- Integrity (p. 32)
- Nonrepudiation (p. 33)
- Standards, Guidelines, and Regulations (p. 33)
- The Internet Engineering Task Force (p. 33)
- ANSI X9 (p. 34)
- National Institute of Standards and Technology (p. 34)
- Common Criteria (p. 36)
- The Health Insurance Portability Act (p. 36)
- Developer Assistance (p. 37)
- Insurance (p. 38)
- Security Research (p. 38)
- Case Studies (p. 39)
- Implementation (p. 39)
- Authentication (p. 40)
- Data at Rest (p. 41)
- Data in Transit (p. 42)
- Summary (p. 42)
- Index (p. 45)