買這商品的人也買了...
-
$1,121Applied Cryptography, 2/e
-
$680$537 -
$680$578 -
$1,750$1,663 -
$399RSA Security's Official Guide to Cryptography
-
$580$458 -
$580$452 -
$920$727 -
$880$695 -
$480$379 -
$720$569 -
$760$600 -
$590$466 -
$620$527 -
$860$731 -
$680$537 -
$690$538 -
$720$562 -
$1,007Modern Cryptography: Theory and Practice (Hardcover)
-
$750$675 -
$560$504 -
$780$702 -
$520$411 -
$480$379 -
$580$458
相關主題
商品描述
Security is the number one concern for businesses worldwide. The gold
standard for attaining security is cryptography because it provides the most
reliable tools for storing or transmitting digital information. Written by Niels
Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company,
and Bruce Schneier himself, this is the much anticipated follow-up book to
Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition
(0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson
(Amsterdam, Netherlands) is a cryptographic engineer and consultant at
Counterpane Internet Security. He has extensive experience in the creation and
design of security algorithms, protocols, and multinational security
infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI.
At CWI he developed the first generation of off-line payment protocols. He has
published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is
Founder and Chief Technical Officer at Counterpane Internet Security, a
managed-security monitoring company. He is also the author of Secrets and Lies:
Digital Security in a Networked World (0-471-25311-1).
Table of Contents
Preface.
1. Our Design Philosophy.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie-Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.