Cryptography and Public Key Infrastructure on the Internet
Klaus Schmeh
- 出版商: Wiley
- 出版日期: 2003-06-02
- 售價: $1,600
- 貴賓價: 9.8 折 $1,568
- 語言: 英文
- 頁數: 488
- 裝訂: Paperback
- ISBN: 047084745X
- ISBN-13: 9780470847459
-
相關分類:
Penetration-test
下單後立即進貨 (約5~7天)
買這商品的人也買了...
-
計算機組織與設計--軟硬體界面第二版 (Computer Organization & Design, 2/e)$680$537 -
Delphi 6 徹底研究$199$155 -
ASP.NET 實例導引 (ASP.NET by Example)$480$379 -
LPI Linux 資格檢定 (LPI Linux Certification in a Nutshell)$880$695 -
鳥哥的 Linux 私房菜$560$476 -
Microsoft Project Version 2002 自學自通 (Microsoft Project Version 2002 Step by Step)$490$387 -
PHP & MySQL 完全架站攻略第二版$620$527 -
JBuilder 實用技術手冊$600$474 -
Red Hat Linux 9 實務應用$650$553 -
Linux 核心程式設計 (Linux Kernel Programming, 3/e)$580$458 -
802.11 無線網路技術通論 (802.11 Wireless Networks: The Definitive Guide)$760$600 -
Dreamweaver MX 互動網站百寶箱 for ASP$580$493 -
ASP.NET 程式設計徹底研究$590$466 -
Red Hat Linux 9 架站實務$620$527 -
STRUTS 實作手冊(Struts in Action: Building Web Applications with the Leading Java Framework)$690$538 -
Dreamweaver MX 與 PHP 網頁設計實務$520$411 -
程式設計專家手冊 (The Practice of Programming)$420$332 -
用實例學 ASP.NET:使用 VB.NET 與 ADO.NET(2003修訂版)$620$490 -
深入淺出 JBuilder 程式設計實作(JBuilder 9.0/8.0/7.0 適用) (Charlie Calvert's Learn Jbuilder)$720$562 -
鳥哥的 Linux 私房菜-伺服器架設篇$750$638 -
鳥哥的 Linux 私房菜─基礎學習篇增訂版$560$476 -
Fedora Core 1 Linux 實務應用$650$553 -
Eclipse 實作手冊─活用 Java 整合開發環境 (Eclipse in Action: A Guide for the Java Developer)$450$351 -
人月神話:軟體專案管理之道 (20 週年紀念版)(The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, 2/e)$480$379 -
JSP 2.0 技術手冊$750$593
相關主題
商品描述
- Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
- the difference between the SSL protocol and the IPSec standard,
- integration of cryptography into the different OSI-layers, and how to decide whether hardware or software solutions are the right means to achieve this.
- standardisation
- authentication
- elliptic curve cryptography
- chip cards
- algorithm modes and protocols - including SSL, TLS, IPSec, SMIME and PGP
protocols
- cryptography's connection with biometry (using biological characteristics for authentication purposes).
Table of Contents
PART 1: WHY CRYPTOGRAPHY ON THE INTERNET?
1. Introduction.
2. What is cryptography and why is it so important?
3. How is it possible to eavesdrop on the Internet?
PART 2: THE PRINCIPLES OF CRYPTOGRAPHY.
4. Symmetric encryption.
5. Modern symmetric encryption algorithms.
6. Asymmetrical encryption.
7. Digital signatures.
8. Cryptographic hash functions.
9. Cryptographic random generators.
PART 3: ADVANCED CRYPTOGRAPHY.
10. Standardisation in cryptography.
11. Block cipher modes of operation and data transformation for asymmetrical algorithms.
12. Cryptographic protocols.
13. Authentication.
14. Cryptosystems based on elliptic curves.
15. Implementating cryptography.
PART 4: PUBLIC KEY INFRASTRUCTURES.
16. Public key infrastructures.
17. How a PKI works.
18. Digital certificates.
19. Certificate servers.
20. Practical aspects of PKI construction.
PART 5: CRYPTO PROTOCOLS FOR THE INTERNET.
21. The Internet and the OSI model.
22. Crypto standards for OSI Layers 1 and 2.
23. IPSec (Layer 3).
24. SSL, TLS and WTLS (Layer 4).
25. Cryptographic standards for the World Wide Web (Layer 7).
26. E-mail encryption standards (Layer 7).
27. Internet payment systems (Layer 7).
28. Further Application Layer protocols.
PART 6: MORE ABOUT CRYPTOGRAPHY.
29. Political aspects of cryptography.
30. People who play a role in cryptography.
31. Where to find out more about cryptography.
32. The last chapter.
Appendix A: List of abbreviations.
Appendix B: Bibliography.
Index.
