Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Internet Cryptography |
List Price: $29.95
Your Price: $29.95 |
 |
|
|
Product Info |
Reviews |
Description:
For all the talk about the Internet's very real security weaknesses, information safety is not all that difficult to achieve. Yes, most Internet technology does a better job of making information accessible than it does of protecting privacy. Still, modern cryptographic products and techniques have made more than adequate security available to just about anyone who needs it. In Internet Cryptography, network security consultant Richard Smith explains the basics of online security. He avoids getting technical with too much cryptographic theory or the mathematics behind the magic. Instead he focuses on providing just enough information to enable information systems managers and administrators to make wise decisions. In fact, Smith pays close attention to matters of system configuration and operation, showing how even the best encryption methods can be ruined by careless operation. From there, Smith explains how today's techniques can protect information from being forged, altered, or stolen. Smith devotes most of his discussion of various cryptographic options to products that are presently on the market. Therefore, the techniques he describes are generally within the reach of most businesses and organizations. He progresses from the simplest to most complex approach, examining the strengths and weaknesses of each. As a result, readers wind up with a solid understanding of cryptographic security as well as a good feel for the level of security they require.
|
|
|
|