Understanding and Applying Cryptography and Data Security by Adam J. Elbirt


IT Management


Risk Management

Business Continuity and Disaster Recovery Planning

Operations and Data Center

Networking and Telecommunications

Project Management



Files for Homework Problems





Request Evalution Copy

Request Solutions Manual

Contact Editor


Books on Cryptography

Practical Cryptography: Algorithms and Implementations Using C++ by Saiful Azad and Al-Sakib Khan Pathan; ISBN 9781482228892
Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture by Ravi Das; ISBN 978-1-4665-9245-2
Image Encryption: A Communication Perspective by Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, and Saleh A. Alshebeili; ISBN 9781466576988
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity by J.J. Stapleton; ISBN 9781466592148

Supplemental Reading for
Understanding and Applying Cryptography and Data Security

Cryptographic Concepts, Methodologies, and Practices

Basics of Security and Cryptography, Saiful Azad and Al-Sakib Khan Pathan

Fundamentals of Cryptography and Encryption, Ronald A. Gove

Cryptographic Transitions, Ralph Spencer Poore

Blind Detection of Steganographic Content in Digital Images Using Cellular Automata, Sasan Hamidi, Ph.D.

An Overview of Quantum Cryptography, Ben Rothke

Elliptic Curve Cryptography: Delivering High-Performance Security for E-Commerce and Communications, Paul Lambert

Cryptographic Key Management Concepts, Ralph Spencer Poore

Message Authentication, James S. Tiller

Steganography: The Art of Hiding Messages, Mark Edmead

An Introduction to Cryptography, Javek Ikbel

Hash Algorithms: From Message Digests to Signatures, Keith Pasley

A Look at the Advanced Encryption Standard (AES), Ben Rothke

Understanding SSL, Chris Hare

IPSec Virtual Private Networks, James S. Tiller

Digital Steganography: Threat or Hype?, James E. Wingate

Protecting Your Data: It's Not Your Father's Encryption, Luther Martin

Encryption Everywhere: Ensuring Access Compliance beyond a Doubt, Ken Salchow,

Private Key Algorithms

Principles and Applications of Cryptographic Key Management, William Hugh Murray

Private Keys, Trusted Third Parties, and Kerberos, Alex Bidwell

Public Key Infrastructure (PKI)

Getting Started with PKI, Harry DeMaio

Mitigating E-Business Security Risks: Public Key Infrastructures in the Real World, Douglas C. Merrill and Eran Feigenbaum

Preserving Public Key Hierarchy, Geoffrey C. Grabow

PKI Registration, Alex Golod

System Architecture for Implementing Cryptographic Functions

Implementing Kerberos in Distributed Systems, Joe Kovara and Ray Kaplan

Methods of Attack

Methods of Attacking and Defending Cryptosystems, Joost Houwen

Use of Cryptography

Auditing Cryptography: Assessing System Security, Steve Stanek

Subscribe to Information Security Today

Bookmark and Share

IT Today

Insightful ...
In-depth ...
Information for today's technology leaders

Information Security Today

© Copyright 2009-2015 Auerbach Publications