Jump to ratings and reviews
Rate this book

Information Security Intelligence: Cryptographic Principles & Applications

Rate this book
Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, code signing, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.

576 pages, Paperback

First published December 29, 2003

Loading...
Loading...

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
4 (33%)
4 stars
4 (33%)
3 stars
3 (25%)
2 stars
1 (8%)
1 star
0 (0%)
Displaying 1 of 1 review
Displaying 1 of 1 review