Cryptographic Attacks

Table of contents:

Need to Know More?

http://cybercrimes.net/Cryptography/Articles/Hebert.html History of cryptography

www.ietf.org/html.charters/pkix-charter.html IETF PKI Working Group

www.ietf.org/rfc/rfc3280.txt RFC 3280 information on PKI

http://docs.hp.com/en/J4255-90011/ch04.html An overview of IPSec

www.wired.com/news/politics/0,1283,41658,00.html Steganography in real life

http://www.itl.nist.gov/fipspubs/fip186.htm Digital signature algorithm

www2.cddc.vt.edu/www.eff.org/pub/Privacy/Crypto/Crypto_misc/DESCracker/ Cracking DES

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vsent7/html/vxconWhatIsSecurability.asp Hashing and security

www.abanet.org/scitech/ec/isc/dsg-tutorial.html Digital signatures

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author

Acknowledgments

We Want to Hear from You!

Introduction

Self-Assessment

The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics

Cryptography

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2



CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net