All Books

  1. home
  2. Books
image description

This is not a book about cryptography, it is about how to apply cryptography to secure telecommunications. There are many fine manuscripts written on the subjects of cryptography and of telecommunications, but few that address the practical links between the two. In the eyes of the Cryptographer and in the ideals of those who employ him, security is often a matter of algorithms and mathematical statistics. Yet this is just the tip of the iceberg and what lies beneath this ’pristine peak’ is a domain that is full of circumstance and danger. It is this grey area that I have addressed in this book and is written on the back of fifteen years experience in applying cryptography, technological know-how and psychological persuasion to the securing of my client’s communications. In my experience the weak links in security have not necessarily been the strength of algorithms and hardware but rather in the way and diligence, or lack of it, that these have been implemented. As a result, what is the actual state of security at the communications level of an organisation is often very far removed from the grand ideals of the strategic decision makers. This book is aimed at providing a warning to those with their heads in the clouds and.............

Related BooksYou May Also Like

View All