Amazon cover image
Image from Amazon.com

Cryptography for dummies / by Chey Cobb.

By: Material type: TextTextSeries: --For dummies | --For dummiesPublisher: Hoboken, NJ : Wiley Pub., 2004Description: xx, 304 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780764541889
Subject(s): DDC classification:
  • 005.8 CO.C 2004 G.C 23
LOC classification:
  • TK5102.94 .C62 2004
Contents:
pt. I. Crypto Basics & What You Really Need to Know -- Ch. 1. A Primer on Crypto Basics -- Ch. 2. Major League Algorithms -- Ch. 3. Deciding What You Really Need -- Ch. 4. Locks and Keys -- pt. II. Public Key Infrastructure -- Ch. 5. The PKI Primer -- Ch. 6. PKI Bits and Pieces -- Ch. 7. All Keyed Up! -- pt. III. Putting Encryption Technologies to Work for You -- Ch. 8. Securing E-Mail from Prying Eyes -- Ch. 9. File and Storage Strategies -- Ch. 10. Authentication Systems -- Ch. 11. Secure E-Commerce -- Ch. 12. Virtual Private Network (VPN) Encryption -- Ch. 13. Wireless Encryption Basics -- pt. IV. The Part of Tens -- Ch. 14. The Ten Best Encryption Web Sites -- Ch. 15. The Ten Most Commonly Misunderstood Encryption Terms -- Ch. 16. Cryptography Do's and Don'ts -- Ch. 17. Ten Principles of "Cryptiquette" -- Ch. 18. Ten Very Useful Encryption Products -- pt. V. Appendixes -- App. A. Cryptographic Attacks -- App. C. Encryption Export Controls.
Summary: Covers the basics of cryptography and computer security, covering such topics as public key infrastructure, e-mail encryption, authentication systems, VPN encryption, and wireless encryption.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.8 CO.C 2004 G.C (Browse shelf(Opens below)) Available 191603

Includes index.

pt. I. Crypto Basics & What You Really Need to Know -- Ch. 1. A Primer on Crypto Basics -- Ch. 2. Major League Algorithms -- Ch. 3. Deciding What You Really Need -- Ch. 4. Locks and Keys -- pt. II. Public Key Infrastructure -- Ch. 5. The PKI Primer -- Ch. 6. PKI Bits and Pieces -- Ch. 7. All Keyed Up! -- pt. III. Putting Encryption Technologies to Work for You -- Ch. 8. Securing E-Mail from Prying Eyes -- Ch. 9. File and Storage Strategies -- Ch. 10. Authentication Systems -- Ch. 11. Secure E-Commerce -- Ch. 12. Virtual Private Network (VPN) Encryption -- Ch. 13. Wireless Encryption Basics -- pt. IV. The Part of Tens -- Ch. 14. The Ten Best Encryption Web Sites -- Ch. 15. The Ten Most Commonly Misunderstood Encryption Terms -- Ch. 16. Cryptography Do's and Don'ts -- Ch. 17. Ten Principles of "Cryptiquette" -- Ch. 18. Ten Very Useful Encryption Products -- pt. V. Appendixes -- App. A. Cryptographic Attacks -- App. C. Encryption Export Controls.

Covers the basics of cryptography and computer security, covering such topics as public key infrastructure, e-mail encryption, authentication systems, VPN encryption, and wireless encryption.

There are no comments on this title.

to post a comment.