Cliquez ici KDPContest nav-sa-clothing-shoes undrgrnd Cloud Drive Photos cliquez_ici Cliquez ici Acheter Fire Achetez Kindle Paperwhite cliquez_ici

Commentaires client

5,0 sur 5 étoiles1
5,0 sur 5 étoiles
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Votre évaluation :(Effacer)Evaluez cet article
Partagez votre opinion avec les autres clients

Un problème s'est produit lors du filtrage des commentaires. Veuillez réessayer ultérieurement.

le 15 mars 2004
When I was a kid I had a slide encrypter and a Captain Midnight decoder. Later when I started with UNIX I was playing with encrypt and decrypt. Some one came up with PGP (pretty good privacy) and other encryption stuff. Then there are the movies about Enigma. All this is fine but how does it work? What practical use is it? Where do I start?
Start here with ICSA Guide to Cryptography. Contents:
First Principles and Overview
Historical Systems
Codes and Machines
Data Encryption Standard (DSE) and Information Theory
Public-Key (Asymmetric) Cryptography
Implementation Mistakes
ICSA Product Certification
Internet Cryptography
Security: Policy, Privacy, and Protocols
IP Security and Secure Virtual Private Networks
Cryptography in Electronic Commerce Systems
Role-Based Cryptography
Cryptanalysis and System Identification
Biometric Encryption
There is much more information that can not all be mentioned on this review. And do not forget there is a CD included with more up to date information.
0Commentaire|Ce commentaire vous a-t-il été utile ?OuiNonSignaler un abus

Liens Sponsorisés

  (De quoi s'agit-il?)