Additional Resources
For more information about cryptography, see the following publications:
Applied Cryptography: Protocols, Algorithms, and Source Code in C by B. Schneier, 1995, New York: John Wiley & Sons.
Internet Cryptography by R. E. Smith, 1997, Reading: Addison-Wesley.
For more information about public key technology and security on intranets and the Internet, refer to the following publications:
Web Security & Commerce by S. Garfinkel and G. Spafford, 1997, Sebastopol: O'Reilly & Associates.
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption by W. Ford and M. S. Baum, 1997, Upper Saddle River: Prentice Hall PTR.
Understanding Digital Signatures: Establishing Trust over the Internet and Other Networks by G. L. Grant, 1997, New York: McGraw-Hill.
Digital Certificates: Applied Internet Security by Jalal Feghhi, Jalil Feghhi, and P. Williams, 1998, Reading: Addison-Wesley.
See the Internet Engineering Task Force (IETF) link on the Web Resources page at https://windows.microsoft.com/windows2000/reskit/webresources .