Information Security Intelligence: Cryptographic Principles & Applications / Edition 1

Information Security Intelligence: Cryptographic Principles & Applications / Edition 1

by Thomas Calabrese
     
 

View All Available Formats & Editions

ISBN-10: 1401837271

ISBN-13: 9781401837273

Pub. Date: 12/29/2003

Publisher: Cengage Learning

Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic

Overview

Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, code signing, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.

Product Details

ISBN-13:
9781401837273
Publisher:
Cengage Learning
Publication date:
12/29/2003
Edition description:
BK&CD-ROM
Pages:
512
Sales rank:
1,005,573
Product dimensions:
7.90(w) x 9.24(h) x 0.84(d)

Table of Contents

Section 1: INFORMATION & SECURITY PLANNING. Introduction to Information Theory. Threat Agents & Risk. Information & The Law. A Model for Information Security Planning. Section 2: CRYPTOGRAPHIC PRINCIPLES AND METHODS. Cryptographic Philosophy. Mathematical Principles of Cryptography. Symmetrical Key Cryptography. Public Key Infrastructure. Section 3: INFORMATION SYSTEM SECURITY. Securing The Information System. Viruses & Worms. Securing the Digital Marketplace.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >