Computer Security and Cryptography
2008-02-01 15:52
302 查看
Review
"...essential reading for professionals in e-commerce and information technology...it is also ideal for students." (IEEE Computer Magazine, March 2007)
Book Description
Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.
The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.
Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.
Three basic types of chapters are featured to facilitate learning:
* Chapters that develop technical skills
* Chapters that describe a cryptosystem and present a method of analysis
* Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions
With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.
# 544 pages
# Publisher: Wiley-Interscience (January 29, 2007)
# Language: English
# ISBN-10: 0471947830
# ISBN-13: 978-0471947837 http://rapidshare.com/files/88228432/comphy.pdf
"...essential reading for professionals in e-commerce and information technology...it is also ideal for students." (IEEE Computer Magazine, March 2007)
Book Description
Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.
The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.
Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.
Three basic types of chapters are featured to facilitate learning:
* Chapters that develop technical skills
* Chapters that describe a cryptosystem and present a method of analysis
* Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions
With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.
# 544 pages
# Publisher: Wiley-Interscience (January 29, 2007)
# Language: English
# ISBN-10: 0471947830
# ISBN-13: 978-0471947837 http://rapidshare.com/files/88228432/comphy.pdf
相关文章推荐
- Computer Security and Cryptography
- Computer Security Conference Ranking and Statistic
- [Computer and Network Security] Large-Scale Network Attacks
- Cryptography, Security and the Future
- [Computer and Network Security] Programming with OpenSSL
- Computer Security Conference Ranking and Statistic
- CSIT571: Cryptography and Security Homework1
- Cryptography And Network Security - notes
- Information Assurance: Security in the Information Environment (Computer Communications and Networks
- .NET Security and Cryptography
- [Computer and Network Security] Applied Cryptography
- [Computer and Network Security] HTTP and Session Management
- Machine Learning and Data Mining for Computer Security: Methods and Applications
- Computer Viruses and Malware (Advances in Information Security)
- CSIT571 Cryptography and Security Quiz 1
- Cryptography and Security Services: Mechanisms and Applications
- [Computer and Network Security] Firewall and NIDS
- Computer Security Conference Ranking and Statistic 计算机安全会议排名和统计
- Cryptographic cloud storage financial cryptography and data security(译)