Information Security Intelligence

Information Security Intelligence

4.11 - 1251 ratings - Source

Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is presented and explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.aquot;About Virtual Private Networks, aquot; [25 March 2003], Aitken, Peter and Bradley L. ... aquot;A Short History of Cryptography ... Cretaro, PauL Lab Manual For Security aamp; Guide to Network Security Fundamentals.

Title:Information Security Intelligence
Author:Thomas Calabrese
Publisher:Cengage Learning - 2004


You Must CONTINUE and create a free account to access unlimited downloads & streaming