Cryptography and security services mechanisms and applications /
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. This bo...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2008.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- 1. Classic cryptography
- 2. Information assurance
- 3. Number theory and finite fields
- 4. Confidentiality
- 5. Confidentiality
- 6. Integrity and authentication
- 7. Access authentication
- 8. Elliptic curve cryptograpy
- 9. Certificates and public key infrastructure
- 10. Electronic mail security
- 11. VPNS and IPSEC
- 12. TLS, SSL, and SET
- 13. Web services security
- 14. Wireless security.