General Notions of Information Security
main Methods of Providing Security
When There Is Too Much Security
Estimating Effectiveness
Basics
Cryptography for Nonmathematicians
Reliability of Algorithms and Protocols
How To Choose Algorithms
Tasks Of Application Protection
Application Registration Codes
Binding Applications to Media
Dongles
Using Protectors
Don't Make the Intruder's Job Easier
Providing Secrecy
Features Of DRM Implementation
Protecting Data with Steganography
Reasons for Weakened Security
Who Needs It?
Internet: A Goldmine Of Information
Investigator's Toolkit
Reconstruction Of Cryptographic Protocols
What Does the Future Hold?