Cryptography For Dummies


Book Description

Cryptography is the most effective way to achieve data securityand is essential to e-commerce activities such as online shopping,stock trading, and banking This invaluable introduction to the basics of encryption coverseverything from the terminology used in the field to specifictechnologies to the pros and cons of different implementations Discusses specific technologies that incorporate cryptographyin their design, such as authentication methods, wirelessencryption, e-commerce, and smart cards Based entirely on real-world issues and situations, thematerial provides instructions for already available technologiesthat readers can put to work immediately Expert author Chey Cobb is retired from the NRO, where she helda Top Secret security clearance, instructed employees of the CIAand NSA on computer security and helped develop the computersecurity policies used by all U.S. intelligence agencies




Digital Certificates


Book Description

Digital certificates, a new form of electronic ID, is a new security technology that establishes a digital identity for a person or a company and guarantees the authenticity of information delivered over the Web or via email. This title explores all of the critical aspects of digital certificates in detail and provides basic information on cryptography. The CD-ROM contains a complete system for controlling access to information on the Internet based on digital certificate technology.




Rethinking Public Key Infrastructures and Digital Certificates


Book Description

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.




Digital Identity


Book Description

Some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. This book explains how to go about it. It details an important concept known as "identity management architecture" (IMA): a method to provide ample protection.




Understanding Public-key Infrastructure


Book Description

This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization.







The Essential Guide to Computing


Book Description

Perfect for anyone who needs a basic understanding of how computers work, this introductory guide gives friendly, accessible, up-to-date explanations of computer hardware, software, networks, and the Internet. Coverage also includes micro-processors, operating systems, programming languages, applications, and e-commerce.




InfoWorld


Book Description

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.




Fundamentals of Network Security


Book Description

Here's easy-to-understand book that introduces you to fundamental network security concepts, principles, and terms, while providing you with practical techniques that you can apply on the job. It helps you identify the best type of intrusion detection system for your environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment .




How the Internet Works


Book Description

The mystery is revealed at last in detailed color diagrams and explanations, graphically depicting the technologies that make the Internet work and how they fit together. You'll be able to understand and even one-up your computer geek friends after reading chapters on the Internet's underlying architecture, communication on the Internet, how the Web works, multimedia, and security and parental controls. For anyone interested in the Internet. Annotation copyrighted by Book News, Inc., Portland, OR