Description |
xxi, 419 pages : illustrations ; 23 cm + 1 computer optical disk (4 3/4 in.) |
Contents |
Ch. 1. Why Cryptography? -- Ch. 2. Symmetric-Key Cryptography -- Ch. 3. Symmetric-Key Management -- Ch. 4. The Key Distribution Problem Public-Key Cryptography -- Ch. 5. The Digital Signature -- Ch. 6. Public-Key Infrastructures and the X.509 Standard -- Ch. 7. Network and Transport Security Protocols -- Ch. 8. Application-Layer Security Protocols -- Ch. 9. Hardware Solutions: Overcoming Software Limitations -- Ch. 10. Digital Signatures: Beyond Security -- Ch. 11. Doing It Wrong: The Break-Ins -- Ch. 12. Doing It Right: Following Standards -- App. A. Bits, Bytes, Hex, and ASCII -- App. B. A Layman's Guide to a Subset of ASN. 1, BER, and DER -- App. C. Further Technical Details |
Related To |
Issued with: CD to accompany RSA security's official guide to cryptography |
Issued With |
CD to accompany RSA security's official guide to cryptography |
Notes |
"RSA Press"--cover |
|
Includes index |
Subject |
Digital signatures.
|
|
Computer networks -- Security measures.
|
|
Data encryption (Computer science)
|
|
Cryptography.
|
Author |
Paine, Stephen (Writer on cryptography)
|
|
RSA Security.
|
LC no. |
2001270873 |
ISBN |
007213139X |
|
0072131381 paperback |
|
0072131373 CD-ROM |
|