http://cybercrimes.net/Cryptography/Articles/Hebert.html History of cryptography
www.ietf.org/html.charters/pkix-charter.html IETF PKI Working Group
www.ietf.org/rfc/rfc3280.txt RFC 3280 information on PKI
http://docs.hp.com/en/J4255-90011/ch04.html An overview of IPSec
www.wired.com/news/politics/0,1283,41658,00.html Steganography in real life
http://www.itl.nist.gov/fipspubs/fip186.htm Digital signature algorithm
www2.cddc.vt.edu/www.eff.org/pub/Privacy/Crypto/Crypto_misc/DESCracker/ Cracking DES
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vsent7/html/vxconWhatIsSecurability.asp Hashing and security
www.abanet.org/scitech/ec/isc/dsg-tutorial.html Digital signatures
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2