Cryptography and security services mechanisms and applications /

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. This bo...

Full description

Bibliographic Details
Main Author: Mogollon, Manuel.
Corporate Author: IGI Global.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2008.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 02919cam a2200433 a 4500
001 29216
003 IGIG
005 20100606233842.0
006 m eo d
007 cr bn||||m|||a
008 070608s2008 paua fob 001 0 eng d
010 # # |z 2007024202 
020 # # |a 9781599048390 (ebook) 
020 # # |z 9781599048376 (hardcover) 
020 # # |z 159904837X (hardcover) 
020 # # |z 9781616927301 (pbk.) 
024 7 # |a 10.4018/978-1-59904-837-6  |2 doi 
035 # # |a (CaBNVSL)gtp00540430 
035 # # |a (OCoLC)550477907 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b M663 2008e 
082 0 4 |a 005.8  |2 22 
100 1 # |a Mogollon, Manuel. 
245 1 0 |a Cryptography and security services  |b mechanisms and applications /  |c Manuel Mogollon.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2008. 
300 # # |a electronic texts (xv, 471 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references and index. 
505 0 # |a 1. Classic cryptography -- 2. Information assurance -- 3. Number theory and finite fields -- 4. Confidentiality -- 5. Confidentiality -- 6. Integrity and authentication -- 7. Access authentication -- 8. Elliptic curve cryptograpy -- 9. Certificates and public key infrastructure -- 10. Electronic mail security -- 11. VPNS and IPSEC -- 12. TLS, SSL, and SET -- 13. Web services security -- 14. Wireless security. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. This book addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on May 26, 2010). 
650 # 0 |a Computers  |x Access control. 
650 # 0 |a Data encryption (Computer science) 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2007024202  |z 9781599048376  |z 159904837X 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-837-6  |z View fulltext via EzAccess