Krutz, Ronald, and Russell Dean Vines. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security . John Wiley & Sons. Indianapolis, IN, 2001. ISBN 0471413569. Refer to Chapter 4, "Cryptography." The How Encryption Works reference Web site: www.howstuffworks.com/encryption.htm The RSA-based Cryptographic Schemes Web site: www.rsasecurity.com/rsalabs/rsa_algorithm/ The W3C XML Encryption Working Group Web site: www.w3.org/Encryption/2001/ The National Institute of Standards and Technology Web site: www.nist.gov The Rijndael Web site: www.esat.kuleuven.ac.be/~rijmen/rijndael/ The Request for Comments (RFC) 2527, "Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework" on the Internet Engineering Task Force (IETF) Web site: www.ietf.org/rfc/rfc2527.txt The Microsoft Kerberos deployment Web page: www.microsoft.com/technet/treeview/default.asp?url=/TechNet/prodtechnol/windows2000serv/deploy/kerberos.asp The Security books, journals, bibliographies , and publications listing Web site: www.cs.auckland.ac.nz/~pgut001/links/books.html |