ATU Sligo /ATU St Angela's

go

Amazon cover image
Image from Amazon.com

Cryptography for dummies : [electronic book] /

By: Cobb, Chey.
Series: --For dummies: Publisher: Hoboken, N. J. : Wiley Pub., ©2004Description: 1 online resource (xx, 304 pages) : illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9780764568312.Subject(s): Telecommunication -- Security measures -- Popular works | Data encryption (Computer science)DDC classification: 005.824 Online resources: Access ebook here
Contents:
Crypto Basics & What You Really Need to Know -- Primer on Crypto Basics -- Major League Algorithms -- Deciding What You Really Need -- Locks and Keys -- Public Key Infrastructure -- PKI Primer -- PKI Bits and Pieces -- All Keyed Up! -- Putting Encryption Technologies to Work for You -- Securing E-Mail from Prying Eyes -- File and Storage Strategies -- Authentication Systems -- Secure E-Commerce -- Virtual Private Network (VPN) Encryption -- Wireless Encryption Basics -- Part of Tens -- Ten Best Encryption Web Sites -- Ten Most Commonly Misunderstood Encryption Terms -- Cryptography Do's and Don'ts -- Ten Principles of "Cryptiquette" -- Ten Very Useful Encryption Products -- Appendixes -- Cryptographic Attacks -- Encryption Export Controls.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Notes Date due Barcode Item holds
Ebook Ebook ATU Sligo Yeats Library eBook 005.824 COB (Browse shelf(Opens below)) Available Online Unlimited access
Total holds: 0

Includes index.

pt. I. Crypto Basics & What You Really Need to Know -- Ch. 1. Primer on Crypto Basics -- Ch. 2. Major League Algorithms -- Ch. 3. Deciding What You Really Need -- Ch. 4. Locks and Keys -- pt. II. Public Key Infrastructure -- Ch. 5. PKI Primer -- Ch. 6. PKI Bits and Pieces -- Ch. 7. All Keyed Up! -- pt. III. Putting Encryption Technologies to Work for You -- Ch. 8. Securing E-Mail from Prying Eyes -- Ch. 9. File and Storage Strategies -- Ch. 10. Authentication Systems -- Ch. 11. Secure E-Commerce -- Ch. 12. Virtual Private Network (VPN) Encryption -- Ch. 13. Wireless Encryption Basics -- pt. IV. Part of Tens -- Ch. 14. Ten Best Encryption Web Sites -- Ch. 15. Ten Most Commonly Misunderstood Encryption Terms -- Ch. 16. Cryptography Do's and Don'ts -- Ch. 17. Ten Principles of "Cryptiquette" -- Ch. 18. Ten Very Useful Encryption Products -- pt. V. Appendixes -- App. A. Cryptographic Attacks -- App. C. Encryption Export Controls.

Share