Coronavirus, Tracking Coronavirus, Cryptography, Value of Military Bases, Retirement Tool, Check your Retirement

Cryptography

Cryptography

By Manuel Mogollon
Published by IGI Global in January 2007

When network security is mentioned, the general public is more often aware of security failures than of the technology available for secure communications. Viruses, worms, Trojan horses, denial-of-service attacks, and phishing are well known occurrences. Access controls, authentication, confidentiality, integrity, and non-repudiation, which are measures to safeguard security, are neither well known nor appreciated. However, when these security mechanisms are in place, users can have a degree of confidence that their communications will be sent and received as intended.
 
The basic principles of secure communications have not changed with technology and communication advances. Today, communications companies are working to provide security services and to implement security mechanisms in email
correspondence, Virtual Private Networks, ecommerce, Web services, and wireless products. However, the tremendous increase in the use of technology has made it challenging to keep up with the need for security
.
The Cryptography and Security Services: Mechanisms and Applications book is intended to provide those in the Information Assurance field with a basic technical reference that provides the language, knowledge, and tools to understand and implement security services, mechanisms, and applications in today's secure communications networks. This book could also be used as a text in a one semester Information Assurance course, especially in Master of Business Administration and Master of Science programs.

Readers with backgrounds in telecommunications and information technology will probably be somewhat familiar with certain parts of the material covered in this book. Other readers, for example, those in the Master of Business Administration in information Assurance program may find that this book has too much technical information for their future needs. In those situations, professors may decide not to emphasize the technical parts of the material and focus on those principles that are essential to Information Assurance.New Paragraph
Share by: