Cryptography for Network and Information Security
|
|
Additional Resources
For more information about cryptography, see the following publications:
- Applied Cryptography: Protocols, Algorithms, and Source Code in C by B. Schneier, 1995, New York: John Wiley & Sons.
- Internet Cryptography by R. E. Smith, 1997, Reading: Addison-Wesley.
For more information about public key technology and security on intranets and the Internet, refer to the following publications:
- Web Security & Commerce by S. Garfinkel and G. Spafford, 1997, Sebastopol: O'Reilly & Associates.
- Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption by W. Ford and M. S. Baum, 1997, Upper Saddle River: Prentice Hall PTR.
- Understanding Digital Signatures: Establishing Trust over the Internet and Other Networks by G. L. Grant, 1997, New York: McGraw-Hill.
- Digital Certificates: Applied Internet Security by Jalal Feghhi, Jalil Feghhi, and P. Williams, 1998, Reading: Addison-Wesley.
- See the Internet Engineering Task Force (IETF) link on the Web Resources page at http://windows.microsoft.com/windows2000/reskit/webresources.
© 1985-2000 Microsoft Corporation. All rights reserved.