ATU Sligo /ATU St Angela's

go

Amazon cover image
Image from Amazon.com

Cryptography for dummies : [electronic book] /

By: Cobb, Chey.
Series: --For dummies: Publisher: Hoboken, N. J. : Wiley Pub., ©2004Description: 1 online resource (xx, 304 pages) : illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9780764568312.Subject(s): Telecommunication -- Security measures -- Popular works | Data encryption (Computer science)DDC classification: 005.824 Online resources: Access ebook here
Contents:
Crypto Basics & What You Really Need to Know -- Primer on Crypto Basics -- Major League Algorithms -- Deciding What You Really Need -- Locks and Keys -- Public Key Infrastructure -- PKI Primer -- PKI Bits and Pieces -- All Keyed Up! -- Putting Encryption Technologies to Work for You -- Securing E-Mail from Prying Eyes -- File and Storage Strategies -- Authentication Systems -- Secure E-Commerce -- Virtual Private Network (VPN) Encryption -- Wireless Encryption Basics -- Part of Tens -- Ten Best Encryption Web Sites -- Ten Most Commonly Misunderstood Encryption Terms -- Cryptography Do's and Don'ts -- Ten Principles of "Cryptiquette" -- Ten Very Useful Encryption Products -- Appendixes -- Cryptographic Attacks -- Encryption Export Controls.
Star ratings
    Average rating: 0.0 (0 votes)

Includes index.

pt. I. Crypto Basics & What You Really Need to Know -- Ch. 1. Primer on Crypto Basics -- Ch. 2. Major League Algorithms -- Ch. 3. Deciding What You Really Need -- Ch. 4. Locks and Keys -- pt. II. Public Key Infrastructure -- Ch. 5. PKI Primer -- Ch. 6. PKI Bits and Pieces -- Ch. 7. All Keyed Up! -- pt. III. Putting Encryption Technologies to Work for You -- Ch. 8. Securing E-Mail from Prying Eyes -- Ch. 9. File and Storage Strategies -- Ch. 10. Authentication Systems -- Ch. 11. Secure E-Commerce -- Ch. 12. Virtual Private Network (VPN) Encryption -- Ch. 13. Wireless Encryption Basics -- pt. IV. Part of Tens -- Ch. 14. Ten Best Encryption Web Sites -- Ch. 15. Ten Most Commonly Misunderstood Encryption Terms -- Ch. 16. Cryptography Do's and Don'ts -- Ch. 17. Ten Principles of "Cryptiquette" -- Ch. 18. Ten Very Useful Encryption Products -- pt. V. Appendixes -- App. A. Cryptographic Attacks -- App. C. Encryption Export Controls.

Share