Protocols for Authentication and Key Establishment

Download Protocols for Authentication and Key Establishment PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3662095270
Total Pages : 343 pages
Book Rating : 4.6/5 (62 download)

DOWNLOAD NOW!


Book Synopsis Protocols for Authentication and Key Establishment by : Colin Boyd

Download or read book Protocols for Authentication and Key Establishment written by Colin Boyd and published by Springer Science & Business Media. This book was released on 2013-03-09 with total page 343 pages. Available in PDF, EPUB and Kindle. Book excerpt: Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Protocols for Authentication and Key Establishment

Download Protocols for Authentication and Key Establishment PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 9783540431077
Total Pages : 352 pages
Book Rating : 4.4/5 (31 download)

DOWNLOAD NOW!


Book Synopsis Protocols for Authentication and Key Establishment by : Colin Boyd

Download or read book Protocols for Authentication and Key Establishment written by Colin Boyd and published by Springer Science & Business Media. This book was released on 2003-08-08 with total page 352 pages. Available in PDF, EPUB and Kindle. Book excerpt: This comprehensive, integrated treatment of these protocols allows researchers and practitioners to quickly access protocols for their needs and become aware of protocols which have been broken.

Advances in Cryptology — CRYPTO ’93

Download Advances in Cryptology — CRYPTO ’93 PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3540483292
Total Pages : 502 pages
Book Rating : 4.5/5 (44 download)

DOWNLOAD NOW!


Book Synopsis Advances in Cryptology — CRYPTO ’93 by : Douglas R. Stinson

Download or read book Advances in Cryptology — CRYPTO ’93 written by Douglas R. Stinson and published by Springer. This book was released on 2003-05-15 with total page 502 pages. Available in PDF, EPUB and Kindle. Book excerpt: The CRYPTO ’93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months leading up to the conference. There were 136 submitted papers which were considered by the Program Committee. Of these, 38 were selected for presentation at the conference. There was also one invited talk at the conference, presented by Miles Smid, the title of which was “A Status Report On the Federal Government Key Escrow System.” The conference also included the customary Rump Session, which was presided over by Whit Diffie in his usual inimitable fashion. Thanks again to Whit for organizing and running the Rump session. This year, the Rump Session included an interesting and lively panel discussion on issues pertaining to key escrowing. Those taking part were W. Diffie, J. Gilmore, S. Goldwasser, M. Hellman, A. Herzberg, S. Micali, R. Rueppel, G. Simmons and D. Weitzner.

Computer Security and the Internet

Download Computer Security and the Internet PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030336492
Total Pages : 381 pages
Book Rating : 4.0/5 (33 download)

DOWNLOAD NOW!


Book Synopsis Computer Security and the Internet by : Paul C. van Oorschot

Download or read book Computer Security and the Internet written by Paul C. van Oorschot and published by Springer Nature. This book was released on 2020-04-04 with total page 381 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.

E-business and Telecommunications

Download E-business and Telecommunications PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3540886532
Total Pages : 408 pages
Book Rating : 4.5/5 (48 download)

DOWNLOAD NOW!


Book Synopsis E-business and Telecommunications by : Joaquim Filipe

Download or read book E-business and Telecommunications written by Joaquim Filipe and published by Springer Science & Business Media. This book was released on 2008-11-02 with total page 408 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28–31, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), WINSYS (International Conference on Wireless Information Systems) and SIGMAP (International Conf- ence on Signal Processing and Multimedia). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to the ov- all quality of the program and heightened the significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of- business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers accepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these fields are challenging, related and significant.

Authentication and Access Control

Download Authentication and Access Control PDF Online Free

Author :
Publisher : Apress
ISBN 13 : 9781484265697
Total Pages : 205 pages
Book Rating : 4.2/5 (656 download)

DOWNLOAD NOW!


Book Synopsis Authentication and Access Control by : Sirapat Boonkrong

Download or read book Authentication and Access Control written by Sirapat Boonkrong and published by Apress. This book was released on 2021-02-28 with total page 205 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available to protect computer networks, systems, applications, and general digital technologies. Different methods of authentication are covered, including the most commonly used schemes in password protection: two-factor authentication and multi-factor authentication. You will learn how to securely store passwords to reduce the risk of compromise. Biometric authentication—a mechanism that has gained popularity over recent years—is covered, including its strengths and weaknesses. Authentication and Access Control explains the types of errors that lead to vulnerabilities in authentication mechanisms. To avoid these mistakes, the book explains the essential principles for designing and implementing authentication schemes you can use in real-world situations. Current and future trends in authentication technologies are reviewed. What You Will Learn Understand the basic principles of cryptography before digging into the details of authentication mechanisms Be familiar with the theories behind password generation and the different types of passwords, including graphical and grid-based passwords Be aware of the problems associated with the use of biometrics, especially with establishing a suitable level of biometric matching or the biometric threshold value Study examples of multi-factor authentication protocols and be clear on the principles Know how to establish authentication and how key establishment processes work together despite their differences Be well versed on the current standards for interoperability and compatibility Consider future authentication technologies to solve today's problems Who This Book Is For Cybersecurity practitioners and professionals, researchers, and lecturers, as well as undergraduate and postgraduate students looking for supplementary information to expand their knowledge on authentication mechanisms

Handbook of Applied Cryptography

Download Handbook of Applied Cryptography PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 0429881320
Total Pages : 810 pages
Book Rating : 4.4/5 (298 download)

DOWNLOAD NOW!


Book Synopsis Handbook of Applied Cryptography by : Alfred J. Menezes

Download or read book Handbook of Applied Cryptography written by Alfred J. Menezes and published by CRC Press. This book was released on 2018-12-07 with total page 810 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

High Performance Browser Networking

Download High Performance Browser Networking PDF Online Free

Author :
Publisher : "O'Reilly Media, Inc."
ISBN 13 : 1449344720
Total Pages : 420 pages
Book Rating : 4.4/5 (493 download)

DOWNLOAD NOW!


Book Synopsis High Performance Browser Networking by : Ilya Grigorik

Download or read book High Performance Browser Networking written by Ilya Grigorik and published by "O'Reilly Media, Inc.". This book was released on 2013-09-11 with total page 420 pages. Available in PDF, EPUB and Kindle. Book excerpt: How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications—including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC. Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements. You’ll then dive into performance characteristics of technologies such as HTTP 2.0, client-side network scripting with XHR, real-time streaming with SSE and WebSocket, and P2P communication with WebRTC. Deliver superlative TCP, UDP, and TLS performance Speed up network performance over 3G/4G mobile networks Develop fast and energy-efficient mobile applications Address bottlenecks in HTTP 1.x and other browser protocols Plan for and deliver the best HTTP 2.0 performance Enable efficient real-time streaming in the browser Create efficient peer-to-peer videoconferencing and low-latency applications with real-time WebRTC transports

Communication System Security

Download Communication System Security PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1439840369
Total Pages : 752 pages
Book Rating : 4.4/5 (398 download)

DOWNLOAD NOW!


Book Synopsis Communication System Security by : Lidong Chen

Download or read book Communication System Security written by Lidong Chen and published by CRC Press. This book was released on 2012-05-29 with total page 752 pages. Available in PDF, EPUB and Kindle. Book excerpt: Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions. Taking an evolutionary approach to security in today’s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios. Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks. With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.

Understanding Cryptography

Download Understanding Cryptography PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3642041019
Total Pages : 382 pages
Book Rating : 4.6/5 (42 download)

DOWNLOAD NOW!


Book Synopsis Understanding Cryptography by : Christof Paar

Download or read book Understanding Cryptography written by Christof Paar and published by Springer Science & Business Media. This book was released on 2009-11-27 with total page 382 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Applied Cryptography

Download Applied Cryptography PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119439027
Total Pages : 926 pages
Book Rating : 4.1/5 (194 download)

DOWNLOAD NOW!


Book Synopsis Applied Cryptography by : Bruce Schneier

Download or read book Applied Cryptography written by Bruce Schneier and published by John Wiley & Sons. This book was released on 2017-05-25 with total page 926 pages. Available in PDF, EPUB and Kindle. Book excerpt: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

The IMS

Download The IMS PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1118691164
Total Pages : 450 pages
Book Rating : 4.1/5 (186 download)

DOWNLOAD NOW!


Book Synopsis The IMS by : Miikka Poikselkä

Download or read book The IMS written by Miikka Poikselkä and published by John Wiley & Sons. This book was released on 2013-05-29 with total page 450 pages. Available in PDF, EPUB and Kindle. Book excerpt: The 3rd edition of this highly successful text builds on the achievement of the first two editions to provide comprehensive coverage of IMS. It continues to explore the concepts, architecture, protocols and functionalities of IMS while providing a wealth of new and updated information. It is written in a manner that allows readers to choose the level of knowledge and understanding they need to gain about the IMS. With 35% new material, The IMS,IP Multimedia Concepts and Services, 3rd Edition has been completely revised to include updated chapters as well as totally new chapters on IMS multimedia telephony and IMS voice call continuity. Additional new material includes IMS transit, IMS local numbering, emergency sessions, identification of communication services in IMS, new authentication model for fixed access, NAT traversal and globally routable user agents URI. Detailed descriptions of protocol behaviour are provided on a level that can be used for implementation and testing. Key features of the 3rd edition: Two new chapters on IMS multimedia telephony service and IMS Voice Call Continuity Updated information on Third Generation Partnership Project (3GPP) Release 7 level, including architecture, reference points and concepts Substantially extended coverage on IMS detailed procedures Completely rewritten and extended chapters on IMS services

Introduction to Modern Cryptography

Download Introduction to Modern Cryptography PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1351133012
Total Pages : 435 pages
Book Rating : 4.3/5 (511 download)

DOWNLOAD NOW!


Book Synopsis Introduction to Modern Cryptography by : Jonathan Katz

Download or read book Introduction to Modern Cryptography written by Jonathan Katz and published by CRC Press. This book was released on 2020-12-21 with total page 435 pages. Available in PDF, EPUB and Kindle. Book excerpt: Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Group Theoretic Cryptography

Download Group Theoretic Cryptography PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1584888377
Total Pages : 244 pages
Book Rating : 4.5/5 (848 download)

DOWNLOAD NOW!


Book Synopsis Group Theoretic Cryptography by : Maria Isabel Gonzalez Vasco

Download or read book Group Theoretic Cryptography written by Maria Isabel Gonzalez Vasco and published by CRC Press. This book was released on 2015-04-01 with total page 244 pages. Available in PDF, EPUB and Kindle. Book excerpt: Group theory appears to be a promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using groups, including in particular non-Abelian groups, in the field of cryptography. It provides an introduction to cryptography with emphasis on the group theoretic perspective, making it one of the first books to use this approach. The authors provide the needed cryptographic and group theoretic concepts, full proofs of essential theorems, and formal security evaluations of the cryptographic schemes presented. They also provide references for further reading and exercises at the end of each chapter.

Glossary of Key Information Security Terms

Download Glossary of Key Information Security Terms PDF Online Free

Author :
Publisher : DIANE Publishing
ISBN 13 : 1437980090
Total Pages : 211 pages
Book Rating : 4.4/5 (379 download)

DOWNLOAD NOW!


Book Synopsis Glossary of Key Information Security Terms by : Richard Kissel

Download or read book Glossary of Key Information Security Terms written by Richard Kissel and published by DIANE Publishing. This book was released on 2011-05 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: This glossary provides a central resource of definitions most commonly used in Nat. Institute of Standards and Technology (NIST) information security publications and in the Committee for National Security Systems (CNSS) information assurance publications. Each entry in the glossary points to one or more source NIST publications, and/or CNSSI-4009, and/or supplemental sources where appropriate. This is a print on demand edition of an important, hard-to-find publication.

Network Security with OpenSSL

Download Network Security with OpenSSL PDF Online Free

Author :
Publisher : "O'Reilly Media, Inc."
ISBN 13 : 0596551975
Total Pages : 387 pages
Book Rating : 4.5/5 (965 download)

DOWNLOAD NOW!


Book Synopsis Network Security with OpenSSL by : John Viega

Download or read book Network Security with OpenSSL written by John Viega and published by "O'Reilly Media, Inc.". This book was released on 2002-06-17 with total page 387 pages. Available in PDF, EPUB and Kindle. Book excerpt: Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.

Fundamentals of Computer Security

Download Fundamentals of Computer Security PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3662073242
Total Pages : 686 pages
Book Rating : 4.6/5 (62 download)

DOWNLOAD NOW!


Book Synopsis Fundamentals of Computer Security by : Josef Pieprzyk

Download or read book Fundamentals of Computer Security written by Josef Pieprzyk and published by Springer Science & Business Media. This book was released on 2013-03-09 with total page 686 pages. Available in PDF, EPUB and Kindle. Book excerpt: This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.