RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.
Material type:
TextPublication details: New York : McGraw-Hill/Osborne, c2004Edition: Keller Graduate School of Management of DeVry University edDescription: xxi, 501 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN: - 0072254947 (pbk.)
- 9780072254945
- TK5105.59 .B87 2004
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Books
|
Methodist University Library Main General Stacks | TK5105.59 .B87 (Browse shelf(Opens below)) | Available | 31351 | ||||||||||||||
Books
|
Methodist University Library Main General Stacks | TK5105.59 .B87 (Browse shelf(Opens below)) | Available | 31355 | ||||||||||||||
Books
|
Methodist University Library Main General Stacks | TK5105.59 .B87 (Browse shelf(Opens below)) | Available | 31354 | ||||||||||||||
Books
|
Methodist University Library Main General Stacks | Reference | TK5105.59 .B87 (Browse shelf(Opens below)) | Available | 31353 |
Browsing Methodist University Library Main shelves,Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| TK5105.543 .G75 Routing protocols and concepts : | TK5105.543 .L58 LAN switching and wireless : | TK5105.59 .B87 RSA Security's official guide to cryptography / | TK5105.59 .B87 RSA Security's official guide to cryptography / | TK5105.59 .B87 RSA Security's official guide to cryptography / | TK5105.59 .B87 RSA Security's official guide to cryptography / | TK5105.59 .C49 Security+ guide to network security fundamentals Author: Mark D Ciampa |
"RSA Press"--cover.
Includes index.
Chapter 1: Why Cryptography? Chapter 2: Symmetric-Key Cryptography. Chapter 3: Symmetric-Key Management. Chapter 4: The Key Distribution Problem and Public-Key Cryptography. Chapter 5: The Digital Signature. Chapter 6: Public-Key Infrastructures and the X.509 Standard. Chapter 7: Network and Transport Security Protocols. Chapter 8: Application-Layer Security Protocols. Chapter 9: Hardware Solutions: Overcoming Software Limitations. Chapter 10: Digital Signatures: Beyond Security. Chapter 11: Doing It Wrong: The Break-Ins. Chapter 12: Doing It Right: Following Standards.
There are no comments on this title.