Understanding and Applying Cryptography and Data Security by Adam J. Elbirt, An Auerbach Publication

Channels

IT Management

Security

Risk Management

Business Continuity and Disaster Recovery Planning

Operations and Data Center

Networking and Telecommunications

Project Management

Glossary

Archives


Download Files for Homework Problems

Request Evalution Copy

Request Solutions Manual

Contact Editor

 

New Books

Understanding and Applying Cryptography and Data Security
 
Multimedia Content Encryption: Techniques and Applications
 
Data-driven Block Ciphers for Fast Telecommunication Systems
 
A Technical Guide to IPSec Virtual Private Networks
 
Public Key Infrastructure: Building Trusted Applications and Web Services

Supplemental Reading for
Understanding and Applying Cryptography and Data Security

Cryptographic Concepts, Methodologies, and Practices

Cryptographic Transitions, Ralph Spencer Poore

Blind Detection of Steganographic Content in Digital Images Using Cellular Automata, Sasan Hamidi, Ph.D.

An Overview of Quantum Cryptography, Ben Rothke

Elliptic Curve Cryptography: Delivering High-Performance Security for E-Commerce and Communications, Paul Lambert

Cryptographic Key Management Concepts, Ralph Spencer Poore

Message Authentication, James S. Tiller

Fundamentals of Cryptography and Encryption, Ronald A. Gove

Steganography: The Art of Hiding Messages, Mark Edmead

An Introduction to Cryptography, Javek Ikbel

Hash Algorithms: From Message Digests to Signatures, Keith Pasley

A Look at the Advanced Encryption Standard (AES), Ben Rothke

Understanding SSL, Chris Hare

IPSec Virtual Private Networks, James S. Tiller

Private Key Algorithms

Principles and Applications of Cryptographic Key Management, William Hugh Murray

Public Key Infrastructure (PKI)

Getting Started with PKI, Harry DeMaio

Preserving Public Key Hierarchy, Geoffrey C. Grabow

PKI Registration, Alex Golod

System Architecture for Implementing Cryptographic Functions

Implementing Kerberos in Distributed Systems, Joe Kovara and Ray Kaplan

Methods of Attack

Methods of Attacking and Defending Cryptosystems, Joost Houwen

Use of Cryptography

Auditing Cryptography: Assessing System Security, Steve Stanek

 
Subscribe to Information Security Today





Powered by VerticalResponse


Google Reader or Homepage
Add to My Yahoo!
Subscribe with Bloglines
Subscribe in NewsGator Online

Add to My AOL
Add to Technorati Favorites!



Insightful ...
In-depth ...
Information for today's technology leaders




Links

Peltier Associates


© Copyright 2008 Auerbach Publications