Cryptography for Internet and Database Applications
- 出版商: Wiley
- 出版日期: 2002-09-23
- 售價: $980
- 貴賓價: 9.5 折 $931
- 語言: 英文
- 頁數: 416
- 裝訂: Paperback
- ISBN: 0471210293
- ISBN-13: 9780471210290
貴賓價: $1,989CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100
售價: $600Putting VoIP to Work: Softswitch Network Design and Testing (Hardcover)
貴賓價: $2,470Complete Maya Programming: An Extensive Guide to MEL and C++ API (Paperback)
售價: $1,400Embedded Software Development with eCos
貴賓價: $1,951Complete Java 2 Certification Study Guide, 3/e
貴賓價: $1,568The Indispensable PC Hardware Book, 4/e
貴賓價: $1,676Beginning Oracle Programming
貴賓價: $960Software Engineering: A Practitioner's Approach, 5/e
Cryptography is the gold standard for security. It is used to protect the
transmission and storage of data between two parties by encrypting it into an
unreadable format. Cryptography has enabled the first wave of secure
transmissions, which has helped fuel the growth of transactions like shopping,
banking, and finance over the world's biggest public network, the Internet. Many
Internet applications such as e-mail, databases, and browsers store a tremendous
amount of personal and financial information, but frequently the data is left
unprotected. Traditional network security is frequently less effective at
preventing hackers from accessing this data. For instance, once-private
databases are now completely exposed on the Internet. It turns out that getting
to the database that holds millions of credit card numbers-the transmission-is
secure through the use of cryptography, but the database itself isn't, fueling
the rise of credit card information theft.
A paradigm shift is now under way for cryptography. The only way to make data secure in any application that runs over the Internet is to use secret (also known as private) key cryptography. The current security methods focus on securing Internet applications using public keys techniques that are no longer effective. In this groundbreaking book, noted security expert Nick Galbreath provides specific implementation guidelines and code examples to secure database and Web-based applications to prevent theft of sensitive information from hackers and internal misuse.
Table of Contents
Chapter 1. Bits and Bytes.
Chapter 2. Secret Key Cryptography.
Chapter 3. Public Key Cryptography.
Chapter 4. Random Numbers.
Chapter 5. Java Cryptography.
Chapter 6. Small Message Encoding and Encryption.
Chapter 7. Application and Data Architecture.
Appendix A: Java Cryptography Class Reference.