Cryptography For Dummies
- Paperback | 336 pages
- 148.6 x 214.1 x 18.5mm | 358.34g
- 30 Jan 2004
- John Wiley & Sons Inc
- Hungry Minds Inc,U.S.
- Hoboken, NJ, United States
- 1. Auflage
Other books in this series
02 Nov 2010
29 Jan 2013
25 May 2010
06 Dec 2016
06 May 2013
25 May 2010
09 Aug 2011
09 Oct 2012
17 Nov 2008
02 Dec 2009
01 May 2007
16 Nov 2015
15 Jul 2013
05 Jul 2013
24 Jan 2012
PC Utilities, June 2004)
The reader can dip into it whenever the mood takes them (MicroMart, 29th April 2004)
Back cover copy
Protect yourself and your business from online eavesdroppers -- it's easier than you think!
If you were hoping for a flame-throwing watch or a flying car, we're sorry - this isn't James Bond's equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes it easy to understand. Discover how you can protect information with keys, ciphers, PKIs, certificates, and more.
Praise for Cryptography For Dummies
"Cryptography is absolutely fundamental to security, personal privacy and a trusted global economy. Everyone, and I mean everyone, should understand how to protect themselves and how cryptography is used to protect the world's most important asset: information. Given her extraordinary background and practical experience in network security, Chey Cobb is uniquely qualified to simplify the mystique of cryptography for the average person."
- Winn Schwartau, President, GetInsightU.Com and author "Information Warfare"and "Pearl Harbor Dot Com"
Discover how to:
Analyze off-the-shelf encryption products Decide what type of security you need Create and manage keys Issue digital signatures and certificates Set up SSL for e-commerce Enable wireless encryption
About Chey Cobb
Table of contents
Part I: Crypto Basics & What You Really Need to Know.
Chapter 1: A Primer on Crypto Basics.
Chapter 2: Major League Algorithms.
Chapter 3: Deciding What You Really Need.
Chapter 4: Locks and Keys.
Part II: Public Key Infrastructure.
Chapter 5: The PKI Primer.
Chapter 6: PKI Bits and Pieces.
Chapter 7: All Keyed Up!
Part III: Putting Encryption Technologies to Work for You.
Chapter 8: Securing E-Mail from Prying Eyes.
Chapter 9: File and Storage Strategies.
Chapter 10: Authentication Systems.
Chapter 11: Secure E-Commerce.
Chapter 12: Virtual Private Network (VPN) Encryption.
Chapter 13: Wireless Encryption Basics.
Part IV: The Part of Tens.
Chapter 14: The Ten Best Encryption Web Sites.
Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms.
Chapter 16: Cryptography Do s and Don ts.
Chapter 17: Ten Principles of Cryptiquette .
Chapter 18: Ten Very Useful Encryption Products.
Part V: Appendixes.
Appendix A: Cryptographic Attacks.
Appendix B: Glossary.
Appendix C: Encryption Export Controls.
"The reader can dip into it whenever the mood takes them..." (MicroMart, 29th April 2004)