Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
ICSA Guide to Cryptography

ICSA Guide to Cryptography

List Price: $70.00
Your Price:
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: Textbook in H.E.
Review: I'm a Polytechnic professor teaching Information theory, Coding, Cryptography and related subjects. I have been looking for books which are not very much theoretical and can be used in practice, covering as much of the field (in this case Cryptography) as possible. Reading The Guide I belive I've found the rigt hit. It covers practically all the momentary interested fields of Cryptography and still very well balanced. it is especially useful as textbook in Universities and Technical Colleges, Military and S.service academics in the field of Cryptography. I wish it being translated to my mother language, which is Hungarian.

Rating: 5 stars
Summary: An overview worth taking: once over but not too heavily
Review: Let's face it: unless you have a background in mathematics that facilitates an understanding of equations and the like, cryptography can be pretty rough going. But this book, fortunately, is not for mathmaticians; instead, those who are interested in understanding the basics of cryptography in 532 well-written and relatively understandable pages will be pleased with this introductory book. With the HIPAA (Kennedy Kastenbaum) law's so-called administrative simplification provisions and the pending security regulations for health plans, providers and others being debated, cryptography including encryption technology is going to be a part of health care delivery and it is already important to electronic commerce. This book will be required reading for anyone who must understand what is going on cryptographically and how it all works. From the perspective of a health information and technology lawyer, this book was a worthwhile addition to my library.

Rating: 5 stars
Summary: Thing sure have advanced
Review: When I was a kid I had a slide encrypter and a Captain Midnight decoder. Later when I started with UNIX I was playing with encrypt and decrypt. Some one came up with PGP (pretty good privacy) and other encryption stuff. Then there are the movies about Enigma. All this is fine but how does it work? What practical use is it? Where do I start?

Start here with ICSA Guide to Cryptography. Contents:

Introduction

First Principles and Overview

Historical Systems

Codes and Machines

Data Encryption Standard (DSE) and Information Theory

Public-Key (Asymmetric) Cryptography

Algorithms

Implementation Mistakes

ICSA Product Certification

Internet Cryptography

Security: Policy, Privacy, and Protocols

Smartcards

IP Security and Secure Virtual Private Networks

Cryptography in Electronic Commerce Systems

Role-Based Cryptography

Cryptanalysis and System Identification

Biometric Encryption

There is much more information that can not all be mentioned on this review. And do not forget there is a CD included with more up to date information.

Rating: 5 stars
Summary: Thing sure have advanced
Review: When I was a kid I had a slide encrypter and a Captain Midnight decoder. Later when I started with UNIX I was playing with encrypt and decrypt. Some one came up with PGP (pretty good privacy) and other encryption stuff. Then there are the movies about Enigma. All this is fine but how does it work? What practical use is it? Where do I start?

Start here with ICSA Guide to Cryptography. Contents:

Introduction

First Principles and Overview

Historical Systems

Codes and Machines

Data Encryption Standard (DSE) and Information Theory

Public-Key (Asymmetric) Cryptography

Algorithms

Implementation Mistakes

ICSA Product Certification

Internet Cryptography

Security: Policy, Privacy, and Protocols

Smartcards

IP Security and Secure Virtual Private Networks

Cryptography in Electronic Commerce Systems

Role-Based Cryptography

Cryptanalysis and System Identification

Biometric Encryption

There is much more information that can not all be mentioned on this review. And do not forget there is a CD included with more up to date information.


<< 1 >>

© 2004, ReviewFocus or its affiliates