Jump to ratings and reviews
Rate this book

ICSA Guide to Cryptography

Rate this book
Protecting the electronic security of sensitive and valuable data is an urgent priority for every business that markets on the Internet or uses global networks for communications and customer service. Cryptography is the most foolproof and cost-effective way to ensure such security, and this guide for managers explains why and how it works. It shows how prevent hackers from invading and destroying data; protect confidential records electronically linked to public firms; and authenticate the validity of parties binding. Endorsed by the International Computer Security Association (ICSA) and written by a foremost expert, it is the authoritative resource to cryptography's extensive and growing uses on the business frontier.

836 pages, Paperback

First published November 23, 1998

3 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (25%)
4 stars
1 (25%)
3 stars
1 (25%)
2 stars
1 (25%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Bernie4444.
2,465 reviews11 followers
October 4, 2023
Thing sure has advanced.

When I was a kid, I had a slide encrypter and a Captain Midnight decoder. Later when I started with UNIX I was playing with encrypting and decrypting. Someone came up with PGP (pretty good privacy) and other encryption stuff. Then there are movies about Enigma. All this is fine but how does it work? What practical use is it? Where do I start?
Start here with the ICSA Guide to Cryptography. Contents:
Introduction
First Principles and Overview
Historical Systems
Codes and Machines
Data Encryption Standard (DSE) and Information Theory
Public-key (Asymmetric) Cryptography
Algorithms
Implementation Mistakes
ICSA Product Certification
Internet Cryptography
Security: Policy, Privacy, and Protocols
Smartcards
IP Security and Secure Virtual Private Networks
Cryptography in Electronic Commerce Systems
Role-Based Cryptography
Cryptanalysis and System Identification
Biometric Encryption
There is much more information that cannot be mentioned in this review. And do not forget there is a CD included with more up-to-date information.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.