Judul | RSA Security?s Official Guide to Cryptography |
Pengarang | Steve Burnett |
Penerbitan | New York Mc Graw Hill 2004 |
Deskripsi Fisik | xxi, 501 p.: ill. ;24 cm. |
ISBN | 0072254947 |
Subjek | Computer networks --Security measures. Data encryption (Computer science) Cryptography. |
Abstrak | crytography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks. |
Catatan | Indeks : p.489-501 |
Bahasa | Inggris |
Bentuk Karya | Tidak ada kode yang sesuai |
Target Pembaca | Tidak ada kode yang sesuai |
Tag | Ind1 | Ind2 | Isi |
001 | INLIS000000000004925 | ||
005 | 20200508202933 | ||
008 | 200508||||||||| | ||| |||| ||eng|| | ||
020 | $a 0072254947 | ||
035 | 0010-0520004925 | ||
041 | $a eng | ||
082 | 0 | $a 005.8 | |
084 | $a 005.8/BUR/R | ||
100 | 0 | $a Steve Burnett | |
245 | 0 | 0 | $a RSA Security?s Official Guide to Cryptography |
260 | $a New York $b Mc Graw Hill $c 2004 | ||
300 | $a xxi, 501 p.$b : ill. ;$c 24 cm. | ||
500 | $a Indeks : p.489-501 | ||
520 | $a crytography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks. | ||
650 | 0 | $a Computer networks --Security measures. | |
650 | 0 | $a Cryptography. | |
650 | 0 | $a Data encryption (Computer science) |
Content Unduh katalog
Karya Terkait :