Logo

Cryptography and Security in Computing

Small book cover: Cryptography and Security in Computing

Cryptography and Security in Computing
by

Publisher: InTech
ISBN-13: 9789535101796
Number of pages: 242

Description:
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.

Home page url

Download or read it online for free here:
Download link
(4.1MB, PDF)

Similar books

Book cover: Security+ EssentialsSecurity+ Essentials
- Techotopia
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
(10617 views)
Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(1105 views)
Book cover: Rethinking Public Key Infrastructures and Digital CertificatesRethinking Public Key Infrastructures and Digital Certificates
by - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(6971 views)
Book cover: Selected Aspects of Computer Security in Open SystemsSelected Aspects of Computer Security in Open Systems
by - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
(4857 views)