Skip to content

RSA Security's Official Guide to Cryptography

Best in textbook rentals since 2012!

ISBN-10: 0072192259

ISBN-13: 9780072192254

Edition: 2001

Authors: Steve Burnett, Stephen Paine

List price: $59.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $59.99
Copyright year: 2001
Publisher: McGraw-Hill Professional Publishing
Binding: E-Book 
Pages: 419
Language: English

Plenty of people claim to have graduated from the school of "Hard Knocks." Steve Burnett not only graduated, but has the credentials to teach at this unaccredited "institution."He didn't attend college and didn't even graduate the 9th grade. This apparent disability didn't prevent him from building a company from scratch, write a book and create powerful connections that make him the envy of his business peers.

Forewordp. v
Why Cryptography?p. 1
Security Provided by Computer Operating Systemsp. 2
How Operating Systems Workp. 2
Default OS Security: Permissionsp. 3
Attacks on Passwordsp. 4
Attacks That Bypass Operating Systemsp. 6
Data Recovery Attackp. 6
Memory Reconstruction Attackp. 9
Added Protection Through Cryptographyp. 11
The Role of Cryptography in Data Securityp. 12
Doing It Wrong: The Break-Insp. 15
Measuring Lossesp. 15
Types of Security Threatsp. 16
Unauthorized Disclosure of Datap. 17
Unauthorized Modification of Datap. 17
Unauthorized Accessp. 18
Disclosure of Network Trafficp. 19
Spoofing of Network Trafficp. 20
Identifying Intrudersp. 20
Insidersp. 21
Hackersp. 21
Terroristsp. 21
Foreign Intelligence Servicesp. 22
Hactivistsp. 22
Intruder Knowledgep. 23
Case Studiesp. 23
Data in Transitp. 23
Data at Restp. 24
Authenticationp. 25
Implementationp. 26
Information Security: Law Enforcementp. 27
Summaryp. 28
Doing It Right: Following Standardsp. 29
Security Services and Mechanismsp. 30
Authenticationp. 30
Confidentialityp. 32
Integrityp. 32
Nonrepudiationp. 33
Standards, Guidelines, and Regulationsp. 33
The Internet Engineering Task Forcep. 33
ANSI X9p. 34
National Institute of Standards and Technologyp. 34
Common Criteriap. 36
The Health Insurance Portability Actp. 36
Developer Assistancep. 37
Insurancep. 38
Security Researchp. 38
Case Studiesp. 39
Implementationp. 39
Authenticationp. 40
Data at Restp. 41
Data in Transitp. 42
Summaryp. 42
Indexp. 45
Table of Contents provided by Syndetics. All Rights Reserved.