Cryptography for Dummies (For Dummies (Computer/tech))


Cryptography for Dummies (For Dummies (Computer/tech))

  • 提携先の海外書籍取次会社に在庫がございます。通常2週間で発送いたします。
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【重要:入荷遅延について】

  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 304 p.
  • 言語 ENG
  • 商品コード 9780764541889
  • DDC分類 005.8

Full Description

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking. This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations. It discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards. It is based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately. Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies.


Introduction.Part IKnow.Chapter 1: A Primer on Crypto Basics.Chapter 2: Major League Algorithms.Chapter 3: Deciding What You Really Need.Chapter 4: Locks and Keys.Part II: Public Key Infrastructure.Chapter 5: The PKI Primer.Chapter 6: PKI Bits and Pieces.Chapter 7: All Keyed Up!Part III: Putting Encryption Technologies to Work for You.Chapter 8: Securing E-Mail from Prying Eyes.Chapter 9: File and Storage Strategies.Chapter 10: Authentication Systems.Chapter 11: Secure E-Commerce.Chapter 12: Virtual Private Network (VPN) Encryption.Chapter 13: Wireless Encryption Basics.Part IV: The Part of Tens.Chapter 14: The Ten Best Encryption Web Sites.Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms.Chapter 16: Cryptography Do's and Don'ts.Chapter 17: Ten Principles of "Cryptiquette".Chapter 18: Ten Very Useful Encryption Products.Part V: Appendixes.Appendix A: Cryptographic Attacks.Appendix B: Glossary.Appendix C: Encryption Export Controls.Index.