01325 2200229 4500001002100000005001500021008004100036020001500077035001900092041000800111082001000119084001600129100001800145245005000163260003300213300003400246500002300280520069200303650004300995650003901038650001801077INLIS00000000000492520200508202933200508||||||||| | ||| |||| ||eng|| a0072254947 0010-0520004925 aeng0 a005.8 a005.8/BUR/R0 aSteve Burnett00aRSA Security?s Official Guide to Cryptography aNew YorkbMc Graw Hillc2004 axxi, 501 p.b: ill. ;c24 cm. aIndeks : p.489-501 acrytography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks. 0aComputer networks --Security measures. 0aData encryption (Computer science) 0aCryptography.