Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security - the most trusted name in e-security[trademark]. It is a part of the "RSA Press Series".
"synopsis" may belong to another edition of this title.
Learn how cryptography works from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.
This book will show you how to:
Improve security and protect your company's information with the most authoritative guide to cryptography available.About the Author:
Steve Burnett (San Mateo, CA) is an engineer with RSA Labs. Steve spent most of his professional career converting math into computer programs, first at Intergraphs and now with RSA Security. A frequent speaker at industry conferences, Steve is the lead engineer for RSA's BSAFE Crypto-C and Crypto-J products - general purpose Cryptography software development kits in C and Java. Stephen Paine (San Mateo, CA) is a Systems Engineer at RSA Security where he explains concepts in security to corporations and developers worldwide. Stephen has worked in the security field for most of his career, first working with the security of digital communications and networks for the United States Marine Corps, as a Security Architect at SUN Microsystems, applying Cryptography and security to their ERP financial systems.
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Osborne Media, 2001. Paperback. Book Condition: New. 1. Bookseller Inventory # DADAX007213139X
Book Description McGraw-Hill Osborne Media, 2001. Paperback. Book Condition: New. Bookseller Inventory # P11007213139X