Warehouse Stock Clearance Sale

Grab a bargain today!


Cryptography and Public Key Infrastructure on the Internet
By

Rating

Product Description
Product Details

Table of Contents

Foreword by Carl Ellison.



PART 1: WHY CRYPTOGRAPHY ON THE INTERNET?



1. Introduction.



2. What is cryptography and why is it so important?



3. How is it possible to eavesdrop on the Internet?



PART 2: THE PRINCIPLES OF CRYPTOGRAPHY.



4. Symmetric encryption.



5. Modern symmetric encryption algorithms.



6. Asymmetrical encryption.



7. Digital signatures.



8. Cryptographic hash functions.



9. Cryptographic random generators.



PART 3: ADVANCED CRYPTOGRAPHY.



10. Standardisation in cryptography.



11. Block cipher modes of operation and data transformation for asymmetrical algorithms.



12. Cryptographic protocols.



13. Authentication.



14. Cryptosystems based on elliptic curves.



15. Implementating cryptography.



PART 4: PUBLIC KEY INFRASTRUCTURES.



16. Public key infrastructures.



17. How a PKI works.



18. Digital certificates.



19. Certificate servers.



20. Practical aspects of PKI construction.



PART 5: CRYPTO PROTOCOLS FOR THE INTERNET.



21. The Internet and the OSI model.



22. Crypto standards for OSI Layers 1 and 2.



23. IPSec (Layer 3).



24. SSL, TLS and WTLS (Layer 4).



25. Cryptographic standards for the World Wide Web (Layer 7).



26. E-mail encryption standards (Layer 7).



27. Internet payment systems (Layer 7).



28. Further Application Layer protocols.



PART 6: MORE ABOUT CRYPTOGRAPHY.



29. Political aspects of cryptography.



30. People who play a role in cryptography.



31. Where to find out more about cryptography.



32. The last chapter.



Appendix A: List of abbreviations.



Appendix B: Bibliography.



Index.

About the Author

Klaus Schmeh is the author of Cryptography and Public Key Infrastructure on the Internet, published by Wiley.

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Security » Networking
Home » Books » Computers » Security
Home » Books » Computers » Web » General
Home » Books » Computers » Networking » General
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top