MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.

By: Burnett, Steve.
Contributor(s): Paine, Stephen | RSA Security.
Material type: materialTypeLabelBookPublisher: New York : Osborne/McGraw-Hill, 2001Description: xxi, 419 p. : ill. ; 24 cm. + pbk.ISBN: 007213139X.Other title: Official guide to cryptography.Subject(s): Computer networks -- Security measures | Data encryption (Computer science) | CryptographyDDC classification: 005.82
Contents:
Why cryptography? -- Symmetric-key cryptography -- Symmetric-key management -- The key distribution problem and public-key cryptography -- The digital signature -- Public-key infrastructures and the X.509 standard -- Network and transport security protocols -- Application-layer security protocols -- Hardware solutions: overcoming software limitations -- Digital signatures: beyond security -- Doing it wrong: The break-ins -- Doing it right: following standards
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.82 (Browse shelf(Opens below)) 1 Available 00092135
Total holds: 0

Enhanced descriptions from Syndetics:

Cryptography can help keep hackers from altering a Website and protect confidential documents at work.

RSA Press--cover.
Includes index.

Why cryptography? -- Symmetric-key cryptography -- Symmetric-key management -- The key distribution problem and public-key cryptography -- The digital signature -- Public-key infrastructures and the X.509 standard -- Network and transport security protocols -- Application-layer security protocols -- Hardware solutions: overcoming software limitations -- Digital signatures: beyond security -- Doing it wrong: The break-ins -- Doing it right: following standards

Table of contents provided by Syndetics

  • Foreword (p. v)
  • Chapter 1 Why Cryptography? (p. 1)
  • Security Provided by Computer Operating Systems (p. 2)
  • How Operating Systems Work (p. 2)
  • Default OS Security: Permissions (p. 3)
  • Attacks on Passwords (p. 4)
  • Attacks That Bypass Operating Systems (p. 6)
  • Data Recovery Attack (p. 6)
  • Memory Reconstruction Attack (p. 9)
  • Added Protection Through Cryptography (p. 11)
  • The Role of Cryptography in Data Security (p. 12)
  • Chapter 2 Doing It Wrong: The Break-Ins (p. 15)
  • Measuring Losses (p. 15)
  • Types of Security Threats (p. 16)
  • Unauthorized Disclosure of Data (p. 17)
  • Unauthorized Modification of Data (p. 17)
  • Unauthorized Access (p. 18)
  • Disclosure of Network Traffic (p. 19)
  • Spoofing of Network Traffic (p. 20)
  • Identifying Intruders (p. 20)
  • Insiders (p. 21)
  • Hackers (p. 21)
  • Terrorists (p. 21)
  • Foreign Intelligence Services (p. 22)
  • Hactivists (p. 22)
  • Intruder Knowledge (p. 23)
  • Case Studies (p. 23)
  • Data in Transit (p. 23)
  • Data at Rest (p. 24)
  • Authentication (p. 25)
  • Implementation (p. 26)
  • Information Security: Law Enforcement (p. 27)
  • Summary (p. 28)
  • Chapter 3 Doing It Right: Following Standards (p. 29)
  • Security Services and Mechanisms (p. 30)
  • Authentication (p. 30)
  • Confidentiality (p. 32)
  • Integrity (p. 32)
  • Nonrepudiation (p. 33)
  • Standards, Guidelines, and Regulations (p. 33)
  • The Internet Engineering Task Force (p. 33)
  • ANSI X9 (p. 34)
  • National Institute of Standards and Technology (p. 34)
  • Common Criteria (p. 36)
  • The Health Insurance Portability Act (p. 36)
  • Developer Assistance (p. 37)
  • Insurance (p. 38)
  • Security Research (p. 38)
  • Case Studies (p. 39)
  • Implementation (p. 39)
  • Authentication (p. 40)
  • Data at Rest (p. 41)
  • Data in Transit (p. 42)
  • Summary (p. 42)
  • Index (p. 45)

Powered by Koha