Cryptography For Dummies

1. Edition January 2004
336 Pages, Softcover
Wiley & Sons Ltd
Short Description
This book explains the basics of encryption and various techniques and introduces readers to the terminology used in the subject. From there, it moves on to specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards. Explanations of how the technologies work will be included as well as the pros and cons of different implementations.
* Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
* This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
* Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
* Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately
* Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies
Part I: Crypto Basics & What You Really Need to Know.
Chapter 1: A Primer on Crypto Basics.
Chapter 2: Major League Algorithms.
Chapter 3: Deciding What You Really Need.
Chapter 4: Locks and Keys.
Part II: Public Key Infrastructure.
Chapter 5: The PKI Primer.
Chapter 6: PKI Bits and Pieces.
Chapter 7: All Keyed Up!
Part III: Putting Encryption Technologies to Work for You.
Chapter 8: Securing E-Mail from Prying Eyes.
Chapter 9: File and Storage Strategies.
Chapter 10: Authentication Systems.
Chapter 11: Secure E-Commerce.
Chapter 12: Virtual Private Network (VPN) Encryption.
Chapter 13: Wireless Encryption Basics.
Part IV: The Part of Tens.
Chapter 14: The Ten Best Encryption Web Sites.
Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms.
Chapter 16: Cryptography Do's and Don'ts.
Chapter 17: Ten Principles of "Cryptiquette".
Chapter 18: Ten Very Useful Encryption Products.
Part V: Appendixes.
Appendix A: Cryptographic Attacks.
Appendix B: Glossary.
Appendix C: Encryption Export Controls.
Index.
"The reader can dip into it whenever the mood takes them..." (MicroMart, 29th April 2004)