Cryptography and security services mechanisms and applications

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptog...

Full description

Saved in:
Bibliographic Details
Main Author: Mogollon, Manuel
Format: Book
Language:English
Published: Hershey, PA Cybertech Pub. 2007
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam a2200000 a 4500
001 37569
003 MY-KLNDU
005 20241218091323.0
008 150804 2007 paua bi 000 0 eng d
020 |a 9781599048376 
020 |a 159904837X (hardcover) 
020 |z 9781599048390 (ebook) 
020 |z 1599048396 (ebook) 
039 9 |a 201508041046  |b azraai  |c 200911181314  |d VLOAD  |c 200911181056  |d VLOAD  |y 200910091628  |z VLOAD 
040 |a UPNM 
090 |a QA 76.9 .A25  |b M663 2007 
100 1 |a Mogollon, Manuel 
245 1 0 |a Cryptography and security services  |b mechanisms and applications  |c Manuel Mogollon 
260 |a Hershey, PA  |b Cybertech Pub.  |c 2007 
300 |a xv, 471 p.  |b ill.  |c 27 cm 
504 |a Includes bibliographical references and index 
505 0 |a Classic cryptography -- Information assurance -- Number theory and finite fields -- Confidentiality : symmetric encryption -- Confidentiality : asymmetric encryption -- Integrity and authentication -- Access authentication -- Elliptic curve cryptography -- Certificates and public key infrastructure -- Electronic mail security -- VPNS and IPSEC -- TLS, SSL, and SET -- Web services security -- Wireless security. 
520 |a Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and Applications addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks. 
591 |a 0000000367  |b 07/05/08  |c 0198-07  |d 1  |e USD99.95  |f 3.68  |g 368.12  |h KOPERASI KEDAIBUKU UNIVERSITI MALAYA BER 
592 |a B0808210130  |b 08/11/08  |c RM338.83  |d 1  |e 338.83 
650 0 |a Computers  |x access control 
650 0 |a Data encryption (Computer science) 
999 |a vtls000027440  |c 37569  |d 37569