Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Rethinking Public Key Infrastructures and Digital Certificates
  • Language: en
  • Pages: 348

Rethinking Public Key Infrastructures and Digital Certificates

  • Type: Book
  • -
  • Published: 2000-08-30
  • -
  • Publisher: MIT Press

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this una...

Computer Security
  • Language: en
  • Pages: 158

Computer Security

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...

Computer Safety, Reliability, and Security
  • Language: en
  • Pages: 443

Computer Safety, Reliability, and Security

  • Type: Book
  • -
  • Published: 2003-06-29
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 19th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2000, held in Rotterdam, The Netherlands in October 2000.The 33 revised full papers presented together with three invited papers were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on verification and validation; software process improvement; formal methods; safety guidelines, standards and certification; hardware aspects; safety assessment; design for safety; and transport and infrastructure.

Preserving Digital Information
  • Language: en
  • Pages: 326

Preserving Digital Information

Cultural history enthusiasts have asserted the urgent need to protect digital information from imminent loss. This book describes methodology for long-term preservation of all kinds of digital documents. It justifies this methodology using 20th century theory of knowledge communication, and outlines the requirements and architecture for the software needed. The author emphasizes attention to the perspectives and the needs of end users.

Coordination of Internet Agents
  • Language: en
  • Pages: 537

Coordination of Internet Agents

The Internet confronts IT researchers, system designers, and application developers with completely new challenges and, as a fascinating new computing paradigm, agent technology has recently attracted broad interest and strong hopes for shaping the future information society. This monograph-like anthology is the first systematic guide to models and enabling technologies for the coordination of intelligent agents on the Internet and respective applications.

Cryptography in C and C++
  • Language: en
  • Pages: 434

Cryptography in C and C++

  • Type: Book
  • -
  • Published: 2001-03-19
  • -
  • Publisher: Apress

Cryptography in C and C++ mainly focuses on the practical aspects involved in implementing public key cryptography methods, such as the RSA algorithm that was released from patent protection. It also gives both a technical overview and an implementation of the Rijndael algorithm that was selected as the Advanced Encryption Standard by the U.S. government. Author Michael Welschenbach avoids complexities by explaining cryptography and its mathematical basis in terms a programmer can easily understand. This book offers a comprehensive yet relentlessly practical overview of the fundamentals of modern cryptography. It contains a wide-ranging library of code in C and C++, including the RSA algorit...

Firewalls and Internet Security
  • Language: en
  • Pages: 466

Firewalls and Internet Security

Introduces the authors' philosophy of Internet security, explores possible attacks on hosts and networks, discusses firewalls and virtual private networks, and analyzes the state of communication security.

Digital Certificates
  • Language: en
  • Pages: 488

Digital Certificates

Digital certificates, a new form of electronic ID, is a new security technology that establishes a digital identity for a person or a company and guarantees the authenticity of information delivered over the Web or via email. This title explores all of the critical aspects of digital certificates in detail and provides basic information on cryptography. The CD-ROM contains a complete system for controlling access to information on the Internet based on digital certificate technology.

Special Ops: Host and Network Security for Microsoft Unix and Oracle
  • Language: en
  • Pages: 1041

Special Ops: Host and Network Security for Microsoft Unix and Oracle

  • Type: Book
  • -
  • Published: 2003-03-11
  • -
  • Publisher: Elsevier

Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Spec...

Evaluating Networked Information Services
  • Language: en
  • Pages: 376

Evaluating Networked Information Services

Contains thirteen essays in which attendees at the American Society for Information Science's May 1999 mid-year meeting present a number of perspectives on evaluating networked information services and resources.