Protecting the electronic security of sensitive and valuable data is an urgent priority for every business that markets on the Internet or uses global networks for communications and customer service. Cryptography is the most foolproof and cost-effective way to ensure such security, and this guide for managers explains why and how it works. It shows how prevent hackers from invading and destroying data; protect confidential records electronically linked to public firms; and authenticate the validity of parties binding. Endorsed by the International Computer Security Association (ICSA) and written by a foremost expert, it is the authoritative resource to cryptography's extensive and growing uses on the business frontier.
When I was a kid, I had a slide encrypter and a Captain Midnight decoder. Later when I started with UNIX I was playing with encrypting and decrypting. Someone came up with PGP (pretty good privacy) and other encryption stuff. Then there are movies about Enigma. All this is fine but how does it work? What practical use is it? Where do I start? Start here with the ICSA Guide to Cryptography. Contents: Introduction First Principles and Overview Historical Systems Codes and Machines Data Encryption Standard (DSE) and Information Theory Public-key (Asymmetric) Cryptography Algorithms Implementation Mistakes ICSA Product Certification Internet Cryptography Security: Policy, Privacy, and Protocols Smartcards IP Security and Secure Virtual Private Networks Cryptography in Electronic Commerce Systems Role-Based Cryptography Cryptanalysis and System Identification Biometric Encryption There is much more information that cannot be mentioned in this review. And do not forget there is a CD included with more up-to-date information.