Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Half Title
Title Page
Copyright Page
Contents
Preface
Author
1. Introduction
1.1 Book Organization
1.2 Book Applicability
1.3 Network Cartoons
1.4 Cryptography Lexicon
1.5 Industry Standards
2. Cryptography Basics
2.1 Encryption
2.2 Hash Functions
2.3 Integrity and Authentication
2.4 Non-Repudiation
2.5 Tokenization
3. Cryptographic Keys
3.1 Symmetric Keys
3.2 Asymmetric Keys
3.3 Certificates and PKI
3.4 Certificate Validation
4. Authentication Protocols
4.1 Domain Name System Security (DNSSEC)
4.2 Domain Keys Identified Mail (DKIM)
4.3 Security Assertion Markup Language (SAML)
4.4 Open Authorization (OAUTH)
4.5 Password and PIN Verification
4.6 One-Time Password (OTP)
5. Encryption Protocols
5.1 Transport Layer Security (TLS)
5.2 Internet Protocol Security (IPsec)
5.3 Secure Shell (SSH)
5.4 Pretty Good Privacy (OpenPGP)
5.5 Password and Personal Identification Number Encryption
6. Architectures
6.1 Application Architecture
6.2 Network Architecture
6.3 Information Architecture
6.4 Cryptographic Architecture
6.5 Cryptographic Inventory
7. Risk Management
7.1 Facility Security
7.2 System Security
7.3 Cryptographic Modules
7.4 Key Management
7.5 Data Management
8. Security Assessments
8.1 Documentation
8.2 Interviews
8.3 Testing
8.4 Analysis
8.5 Reporting
9. Illustrations
9.1 Hypothetical Mobile Transaction
9.2 EMV Payment Cards
9.3 Secure Electronic Transactions (SET)
9.4 ATM Remote Key Load (RKL)
9.5 Database Encryption (DBE)
Annex Quick References
Bibliography
Index
← Prev
Back
Next →
← Prev
Back
Next →