|Listed in category:
Have one to sell?

Cryptographic Security Architecture : Design and Verification by Peter Gutmann (

US $40.00
ApproximatelyAU $61.79
or Best Offer
Condition:
Brand new
Breathe easy. Returns accepted.
Postage:
Free USPS Media MailTM.
Located in: Blowing Rock, North Carolina, United States
Delivery:
Estimated between Thu, 7 Aug and Tue, 12 Aug to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the postage service selected, the seller's postage history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30-day returns. Buyer pays for return postage. If you use an eBay postage label, it will be deducted from your refund amount.
Payments:
     Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:176280073390

Item specifics

Condition
Brand new: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
Subject
Architecture
ISBN
9780387953878

About this product

Product Identifiers

Publisher
Springer New York
ISBN-10
0387953876
ISBN-13
9780387953878
eBay Product ID (ePID)
2348835

Product Key Features

Number of Pages
Xviii, 320 Pages
Language
English
Publication Name
Cryptographic Security Architecture : Design and Verification
Subject
Information Theory, Communication Studies, Hardware / General, Security / Cryptography, Security / General
Publication Year
2003
Type
Textbook
Author
Peter Gutmann
Subject Area
Computers, Language Arts & Disciplines
Format
Hardcover

Dimensions

Item Weight
27.6 Oz
Item Length
9.3 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2002-070742
Dewey Edition
22
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
The Software Architecture.- The Security Architecture.- The Kernel Implementation.- Verification Techniques.- Verification of the cryptlib Kernel.- Random Number Generation.- Hardware Encryption Modules.- Conclusion.
Synopsis
This new book provides a detailed presentation of a flexible, platform-independent cryptographic security architecture which is suited to software, hardware and hybrid implementations. Using the design architecture, portions of the architecture can be replaced or updated with a minimum of effort, while guaranteeing a consistent interface and handling of objects., A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles and cognitive psychology. Its novel security-kernel design implements a reference monitor that controls access to security-relevant objects and attributes based on a configurable security policy. Topics and features: * Builds a concise architectural design that can be easily extended in the future * Develops an application-specific security kernel that enforces a fully customizable, rule-based security policy * Presents a new verification technique that allows verification from the high-level specification down to the running code * Describes effective security assurance in random number generation, and the pitfalls associated therewith * Examines the generation and protection of cryptovariables, as well as application of the architectural design to cryptographic hardware The work provides an in-depth presentation of a flexible, platform-independent cryptographic security architecture suited to software, hardware, and hybrid implementations. Security design practitioners, professionals, researchers, and advanced students will find the work an essential resource.
LC Classification Number
QA268

Item description from the seller

About this seller

Good and Cheaper Stuff

98.2% positive Feedback3.6K items sold

Joined Jan 2001
Usually responds within 24 hours
Welcome to my eBay Store. Please add me to your list of favorite sellers and visit often. Thank you for your business.

Detailed seller ratings

Average for the last 12 months
Accurate description
5.0
Reasonable postage costs
5.0
Postage speed
5.0
Communication
5.0

Seller feedback (1,651)

All ratings
Positive
Neutral
Negative
  • r***u (4981)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    An A+ ebay seller! Accurate description, fast shipping, great packing.
  • -***3 (135)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Exactly what it is advertised at and arrived in a pretty jewellery bag
  • i***5 (3232)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Fast delivery. We'll packaged. Very pleased with my order. Great seller.