Cite This        Tampung        Export Record
Judul RSA Security?s Official Guide to Cryptography
Pengarang Steve Burnett
Penerbitan New York Mc Graw Hill 2004
Deskripsi Fisik xxi, 501 p.: ill. ;24 cm.
ISBN 0072254947
Subjek Computer networks --Security measures.
Data encryption (Computer science)
Cryptography.
Abstrak crytography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.
Catatan Indeks : p.489-501
Bahasa Inggris
Bentuk Karya Tidak ada kode yang sesuai
Target Pembaca Tidak ada kode yang sesuai

 
No Barcode No. Panggil Akses Lokasi Ketersediaan
00000011995 005.8/BUR/R Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011994 005.8/BUR/R Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
Tag Ind1 Ind2 Isi
001 INLIS000000000004925
005 20200508202933
008 200508||||||||| | ||| |||| ||eng||
020 $a 0072254947
035 0010-0520004925
041 $a eng
082 0 $a 005.8
084 $a 005.8/BUR/R
100 0 $a Steve Burnett
245 0 0 $a RSA Security?s Official Guide to Cryptography
260 $a New York $b Mc Graw Hill $c 2004
300 $a xxi, 501 p.$b : ill. ;$c 24 cm.
500 $a Indeks : p.489-501
520 $a crytography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.
650 0 $a Computer networks --Security measures.
650 0 $a Cryptography.
650 0 $a Data encryption (Computer science)
Content Unduh katalog