Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, code signing, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting. Now you can buy Books online in USA,UK, India and more than 100 countries.
*Terms and Conditions apply
Disclaimer: All product data on this page belongs to . No
guarantees are made as to accuracy of prices and information.
How to buy a book?
Search for a specific Title OR Author Or ISBN
You can search by Title of Book(Partial names allowed).
You can search by Author of Book (Partial names allowed).
You can search by Subject e.g. Physics,chemistry (Partial names allowed).
You can search by ISBN e.g. 10 digits or 13 digits ISBN or asin of Book without any spaces or hyphens.
Shipping of Books is available all over the world with few exceptions.
Buying process is 100% secure.
Visitors Online
Contact Us
Create a Bookshelf of your Favorite books For Any Queries please don't hesitate to contact us at USA +1(760)3380762
+1(650) 9808080
India +91 9023011224
India +91 9023011224 (Whatsapp)
Buy Books online because as an Amazon Associate we earn from qualifying purchases.