Additional Reading


  • Schneier’s Applied Cryptography (John Wiley & Sons, 1995) remains the best generally available work on cryptographic algorithms and protocols. There are many other good texts on the subject, but this is probably the most complete. I recommend it very highly if you’re interested in cryptography or cryptology.

  • Bauer’s Decrypted Secrets (Springer-Verlag, 2002) might be more approachable than Schneier’s book; it’s quite a bit shorter, and it includes a wealth of interesting historical anecdotes and facts.

  • Smith’s Internet Cryptography (Addison-Wesley, 1997) describes SSL/TLS, S/MIME, IPsec, and other network-oriented cryptographic security protocols clearly, but in great detail.

  • The Kerberos protocol is described in Internet RFC 1510 (http://www.ietf.org/rfc/rfc1510.txt). Microsoft’s TechNet site (http://technet.microsoft.com) has a wealth of useful information on Kerberos and Microsoft’s Windows implementation of the services described in the RFC. In particular, there’s a good white paper, “Windows 2000 Kerberos Authentication,” that describes in great detail how Windows uses Kerberos authentication.

  • The Cryptography Frequently Asked Questions list (http://www.rsasecurity.com/rsalabs/faq/index.html), maintained by RSA Data Security, thoroughly covers a variety of questions, including some that you might not have thought of.

  • The amusingly named Big Book of IPsec RFCs by Loshin (Morgan Kaufmann Publishers, 1999) collects all of the IPsec RFCs into a single, neatly bound, well-indexed volume. If you’re really interested in learning about IPsec, this is a valuable reference.




Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000
ISBN: 735618763
EAN: N/A
Year: 2003
Pages: 169

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net