Cryptography for dummies / by Chey Cobb.
Material type: TextSeries: --For dummies | --For dummiesPublisher: Hoboken, NJ : Wiley Pub., 2004Description: xx, 304 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9780764541889
- 005.8 CO.C 2004 G.C 23
- TK5102.94 .C62 2004
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Gift collections | 005.8 CO.C 2004 G.C (Browse shelf(Opens below)) | Available | 191603 |
Browsing The Knowledge Hub Library shelves, Collection: Gift collections Close shelf browser (Hides shelf browser)
005.8 BA.S 2009 G.C Securing PHP web applications / | 005.8 BO.I 2009 G.C Information security and privacy : 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings / | 005.8 CI.C 2009 G.C Comptia Security+ 2008 in depth / | 005.8 CO.C 2004 G.C Cryptography for dummies / | 005.8 CO.N 2003 G.C Network security for dummies / | 005.8 DU.C 2009 G.C CompTIA security+ study guide / | 005.8 HO.B 2005 G.C Beginning cryptography with Java / |
Includes index.
pt. I. Crypto Basics & What You Really Need to Know -- Ch. 1. A Primer on Crypto Basics -- Ch. 2. Major League Algorithms -- Ch. 3. Deciding What You Really Need -- Ch. 4. Locks and Keys -- pt. II. Public Key Infrastructure -- Ch. 5. The PKI Primer -- Ch. 6. PKI Bits and Pieces -- Ch. 7. All Keyed Up! -- pt. III. Putting Encryption Technologies to Work for You -- Ch. 8. Securing E-Mail from Prying Eyes -- Ch. 9. File and Storage Strategies -- Ch. 10. Authentication Systems -- Ch. 11. Secure E-Commerce -- Ch. 12. Virtual Private Network (VPN) Encryption -- Ch. 13. Wireless Encryption Basics -- pt. IV. The Part of Tens -- Ch. 14. The Ten Best Encryption Web Sites -- Ch. 15. The Ten Most Commonly Misunderstood Encryption Terms -- Ch. 16. Cryptography Do's and Don'ts -- Ch. 17. Ten Principles of "Cryptiquette" -- Ch. 18. Ten Very Useful Encryption Products -- pt. V. Appendixes -- App. A. Cryptographic Attacks -- App. C. Encryption Export Controls.
Covers the basics of cryptography and computer security, covering such topics as public key infrastructure, e-mail encryption, authentication systems, VPN encryption, and wireless encryption.
There are no comments on this title.