Amazon cover image
Image from Amazon.com

RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.

By: Contributor(s): Material type: TextPublication details: New York : McGraw-Hill/Osborne, c2004Edition: Keller Graduate School of Management of DeVry University edDescription: xxi, 501 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:
  • 0072254947 (pbk.)
  • 9780072254945
Subject(s): LOC classification:
  • TK5105.59 .B87 2004
Contents:
Chapter 1: Why Cryptography? Chapter 2: Symmetric-Key Cryptography. Chapter 3: Symmetric-Key Management. Chapter 4: The Key Distribution Problem and Public-Key Cryptography. Chapter 5: The Digital Signature. Chapter 6: Public-Key Infrastructures and the X.509 Standard. Chapter 7: Network and Transport Security Protocols. Chapter 8: Application-Layer Security Protocols. Chapter 9: Hardware Solutions: Overcoming Software Limitations. Chapter 10: Digital Signatures: Beyond Security. Chapter 11: Doing It Wrong: The Break-Ins. Chapter 12: Doing It Right: Following Standards.
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books Methodist University Library Main General Stacks TK5105.59 .B87 (Browse shelf(Opens below)) Available 31351
Books Methodist University Library Main General Stacks TK5105.59 .B87 (Browse shelf(Opens below)) Available 31355
Books Methodist University Library Main General Stacks TK5105.59 .B87 (Browse shelf(Opens below)) Available 31354
Books Methodist University Library Main General Stacks Reference TK5105.59 .B87 (Browse shelf(Opens below)) Available 31353

"RSA Press"--cover.

Includes index.

Chapter 1: Why Cryptography? Chapter 2: Symmetric-Key Cryptography. Chapter 3: Symmetric-Key Management. Chapter 4: The Key Distribution Problem and Public-Key Cryptography. Chapter 5: The Digital Signature. Chapter 6: Public-Key Infrastructures and the X.509 Standard. Chapter 7: Network and Transport Security Protocols. Chapter 8: Application-Layer Security Protocols. Chapter 9: Hardware Solutions: Overcoming Software Limitations. Chapter 10: Digital Signatures: Beyond Security. Chapter 11: Doing It Wrong: The Break-Ins. Chapter 12: Doing It Right: Following Standards.

There are no comments on this title.

to post a comment.
Share
Copyright © 2026  MUG Library