Skip to:Content
|
Bottom
Cover image for Information security intelligence : cryptographic principles and applications
Title:
Information security intelligence : cryptographic principles and applications
Personal Author:
Publication Information:
Clifton Park, N.Y. : Thomson Delmar Learning, 2004
Physical Description:
1v + 1 CD-ROM
ISBN:
9781401837273
General Note:
Also available in compact disc version : CP 5816

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010082576 QA76.9.A25 C344 2004 Open Access Book Book
Searching...
Searching...
33000000002879 QA76.9.A25 C344 2004 Open Access Book Gift Book
Searching...

On Order

Summary

Summary

Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is presented and explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.


Table of Contents

Section 1 Information & Security Planning
Introduction to Information Theory
Threat Agents & Risk
Information & The Law
A Model for Information Security Planning
Section 2 Cryptographic Principles and Methods
Cryptographic Philosophy
Mathematical Principles of Cryptography
Symmetrical Key Cryptography
Public Key Infrastructure
Section 3 Information System Security
Securing The Information System
Viruses & Worms
Securing the Digital Marketplace
Go to:Top of Page