Skip to content

Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves

Spend $50 to get a free movie!

ISBN-10: 0072122854

ISBN-13: 9780072122855

Edition: 2000

Authors: Randall K. Nichols

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

RSA is the leading developer of data encryption and cryptography in the United States. This book discusses how attacks occur and how to prevent and deal with them.
Customers also bought

Book details

List price: $49.99
Copyright year: 2000
Publisher: McGraw-Hill Osborne
Publication date: 1/5/2000
Binding: Paperback
Pages: 848
Size: 7.50" wide x 9.50" long x 2.25" tall
Weight: 3.234
Language: English

Prefacep. ix
Acknowledgmentsp. xxi
List of Contributorsp. xxiii
Forewordp. xxxiii
Forewordp. xxxv
Digital Espionage, Warfare, and Information Security (Infosec)p. 1
Introduction to Digital Espionagep. 3
Foundations of Information Security (Infosec)p. 41
Infosec Conceptsp. 67
Risk Management and Architecture of Information Security (Infosec)p. 69
Information Security Policyp. 91
Privacy in a Knowledge-Based Economyp. 119
Security Verification of Systems and Networksp. 143
Practical Countermeasuresp. 161
Cryptographyp. 163
Access Controls--Two Viewsp. 241
Digital Signatures and Certification Authorities--Technology, Policy, and Legal Issuesp. 263
Permissions Management: Identification, Authentication, and Authorization (PMIAA)p. 295
Virtual Private Networksp. 331
Biometric Countermeasuresp. 357
Enterprise Continuity Planningp. 391
Before the Attack: Protect and Detectp. 393
During and After the Attack Special Consideration--The Web Serverp. 435
Order of Battlep. 463
The Big Picturep. 465
Information Warfarep. 501
Information Warfare Weapons, Intelligence, and the Cyberspace Environmentp. 549
Methods of Employmentp. 579
Public Key Infrastructure: Building Trust Onlinep. 603
Cryptography Politics: Encryption Export Law and Its Impact on U.S. Industryp. 631
The Information Technology Revolutionp. 661
Definitions of Elecronic Signatures in Enacted State Legislationp. 677
Enacted Legislation Authorizing the Use of Elecronic Signaturesp. 683
Policy Initiatives--United Statesp. 687
International--35 Countries and Political Entities Enact Digital Signature Legislationp. 691
Bernstein and the Encryption Debatep. 701
VPN Comparisonsp. 725
Liability of Certificate Authorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislationp. 739
Glossaryp. 753
Referensesp. 817
Indexp. 843
Table of Contents provided by Syndetics. All Rights Reserved.