Atul Kahate,
Project Manager, i-flex solutions limited, Pune
ISBN: 0070494835 Copyright year: 2003
Salient Features
Security is one of the most significant concerns of any organisation. This book clearly explains the concepts and practical issues behind Cryptography and Network Security.
The book has a lot of visual appeal, a large number of illustrations (412) are used to aid understanding. Each chapter is followed by multiple-choice questions, review questions and design/programming exercises.
Salient Features :
Practice of security using JAVA and Microsoft Toolkit technologies is demonstrated and practical implementation issues are discussed.
Lucid explanation of technologies of Encryption, Decryption, Symmetric and Asymmetric Key Cryptography.
Detailed analysis and explanation of all major Cryptographic algorithms, including Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), RC5, Blowfish, Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA), Digital Signature Algorithm (DSA).
Coverage of Digital Certificates, Digital Signatures, Public Key Infrastructure (PKI) and Extensible Markup Language (XML) Security.
Focus on Internet Security with coverage of Secure Socket Layer (SSL), Secure Hyper Text Transfer Protocol (SHTTP), Time, Stamping Protocol (TSP), Secure Electronic Transaction (SET), 3D Secure, Pretty Good Privacy (PGP), Privacy-Enhanced Electronic Mail (PEM), Secure Multi-Purpose Internet Mail Extensions (S/MIME).
Trends in Wireless Security: Wireless Application, Protocol (WAP), Global System for Mobile Telecommunication (GSM), Third Generation Services (3G).
Coverage of authentication mechanisms and Single Sign On (SSO) techniques.
A selection of case studies highlighting the various security issues including Denial of Service (DOS) attacks, voting over Internet and online banking transactions.