|
![]() |
|||
|
||||
OverviewSecurity is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web. Full Product DetailsAuthor: P.K. YuenPublisher: Pearson Education (US) Imprint: Addison-Wesley Educational Publishers Inc Dimensions: Width: 23.40cm , Height: 4.90cm , Length: 18.80cm Weight: 1.596kg ISBN: 9780321263339ISBN 10: 0321263332 Pages: 896 Publication Date: 12 October 2005 Audience: College/higher education , Tertiary & Higher Education Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of Contents1. Basic security skills on the World Wide Web 1.1 An introduction to network security 1.1.1 Secure and insecure networks 1.1.2 Digital cryptography on the web 1.2 The web browser-server dialog 1.2.1 The structure and configurations of the web 1.2.2 Web browser and server dialog 1.2.3 My first page with security 1.2.4 Using HTML and migrating to XHTML 1.3 Webpage skills for message manipulation and Security 1.3.1 Number Systems Used On The Web 1.3.2 The Ascii Character Set 1.3.3 Using Unicode On The Web 1.3.4 Numerical Representations Of Messages 1.3.5 Implementation Of The Caesar Code 1.4 Bitwise Operators And Base64 Encoding/Decoding 1.4.1 An Introduction To Bitwise Operators 1.4.2 Bitwise Operations and Encryptions on The Web 1.4.3 Base64 Encoding And Decoding 1.5 The Xor And Pkzip/Winzip Encryption Schemes 1.5.1 Xor Encryption/Decryption 1.5.2 Implementation Of The Xor Scheme On The Web 1.5.3 Encryption/Decryption Of Pkzip And Winzip 1.5.4 Implementation Of The Pkzip/Winzip Encryption Scheme 2. Cryptology, Website Protection And Attacks 2.1 An Overview Of Cryptology What Is Cryptology? Examples On Classic Ciphers And Attacks Basic User Authentication And Website Protections 2.2.1 The Beginning Of Cipher-Based Authentication 2.2.2 Basic HTTP Authentication With ApacheReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |