Understanding and Applying Cryptography and Data Security by Adam J. Elbirt

Channels

IT Management

Security

Risk Management

Business Continuity and Disaster Recovery Planning

Operations and Data Center

Networking and Telecommunications

Project Management

Glossary

Archives


Files for Homework Problems

gmp.h

HW7-4-26-Parameters.htm

HW8-7-24-Parameters.htm

HW10-2-4Plaintext.txt


Request Evalution Copy

Request Solutions Manual

Contact Editor

 

Books on Cryptography

Public Key Infrastructure: Building Trusted Applications and Web Services
Investigator's Guide to Steganography
A Technical Guide to IPSec Virtual Private Networks
Multimedia Content Encryption
Data-driven Block Ciphers for Fast Telecommunication Systems
Public Key Infrastructure
Investigator's Guide to Steganography
A Technical Guide to IPSec Virtual Private Networks
Multimedia Content Encryption
Data-driven Block Ciphers for Fast Telecommunication Systems

Supplemental Reading for
Understanding and Applying Cryptography and Data Security

Cryptographic Concepts, Methodologies, and Practices

Fundamentals of Cryptography and Encryption, Ronald A. Gove

Cryptographic Transitions, Ralph Spencer Poore

Blind Detection of Steganographic Content in Digital Images Using Cellular Automata, Sasan Hamidi, Ph.D.

An Overview of Quantum Cryptography, Ben Rothke

Elliptic Curve Cryptography: Delivering High-Performance Security for E-Commerce and Communications, Paul Lambert

Cryptographic Key Management Concepts, Ralph Spencer Poore

Message Authentication, James S. Tiller

Steganography: The Art of Hiding Messages, Mark Edmead

An Introduction to Cryptography, Javek Ikbel

Hash Algorithms: From Message Digests to Signatures, Keith Pasley

A Look at the Advanced Encryption Standard (AES), Ben Rothke

Understanding SSL, Chris Hare

IPSec Virtual Private Networks, James S. Tiller

Digital Steganography: Threat or Hype?, James E. Wingate

Protecting Your Data: It's Not Your Father's Encryption, Luther Martin

Encryption Everywhere: Ensuring Access Compliance beyond a Doubt, Ken Salchow,

Private Key Algorithms

Principles and Applications of Cryptographic Key Management, William Hugh Murray

Private Keys, Trusted Third Parties, and Kerberos, Alex Bidwell

Public Key Infrastructure (PKI)

Getting Started with PKI, Harry DeMaio

Mitigating E-Business Security Risks: Public Key Infrastructures in the Real World, Douglas C. Merrill and Eran Feigenbaum

Preserving Public Key Hierarchy, Geoffrey C. Grabow

PKI Registration, Alex Golod

System Architecture for Implementing Cryptographic Functions

Implementing Kerberos in Distributed Systems, Joe Kovara and Ray Kaplan

Methods of Attack

Methods of Attacking and Defending Cryptosystems, Joost Houwen

Use of Cryptography

Auditing Cryptography: Assessing System Security, Steve Stanek

 
Subscribe to Information Security Today





Powered by VerticalResponse


Google Reader or Homepage
Add to My Yahoo!
Subscribe with Bloglines
Subscribe in NewsGator Online

Add to My AOL
Add to Technorati Favorites!



IT Today

Insightful ...
In-depth ...
Information for today's technology leaders


Information Security Today




© Copyright 2009-2010 Auerbach Publications