Guide to Internet Cryptography [E-Book] : Security Protocols and Real-World Attack Implications / by Jörg Schwenk.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Interne...
Saved in:
Full text |
|
Personal Name(s): | Schwenk, Jörg, author |
Edition: |
1st edition 2022. |
Imprint: |
Cham :
Springer,
2022
|
Physical Description: |
XIX, 530 pages 272 illustrations, 80 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031194399 |
DOI: |
10.1007/978-3-031-19439-9 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Information Security and Cryptography
|
Subject (LOC): |
- Introduction
- The Internet
- Cryptography: Confidentiality
- Cryptography: Integrity and Authenticity
- Cryptographic Protocols
- Point-to-Point Security
- Wireless LAN (WLAN)
- Cellular Networks
- IP Security (IPsec)
- Security of HTTP
- Transport Layer Security
- A Short History of TLS
- Attacks on SSL and TLS
- Secure Shell (SSH)
- Kerberos
- DNS Security
- File Encryption: PGP
- Email Security: S/MIME
- Attacks on S/MIME and OpenPGP
- Email: Protocols and SPAM
- Web Security and Single Sign-On Protocols
- Cryptographic Data Formats
- Index.