|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn784886692 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120409s2012 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d N$T
|d YDXCP
|d OCLCQ
|d IDEBK
|d OCLCQ
|d OCLCF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d Z5A
|d LIP
|d OCLCA
|d AGLDB
|d OCLCQ
|d UEJ
|d JBG
|d D6H
|d OCLCQ
|d VTS
|d REC
|d TKN
|d STF
|d OCLCQ
|d UKAHL
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 817083150
|
020 |
|
|
|a 9780191625879
|q (electronic bk.)
|
020 |
|
|
|a 0191625876
|q (electronic bk.)
|
020 |
|
|
|a 1280594705
|
020 |
|
|
|a 9781280594700
|
029 |
1 |
|
|a DEBBG
|b BV043059622
|
029 |
1 |
|
|a DEBSZ
|b 422916404
|
029 |
1 |
|
|a DEBSZ
|b 423097202
|
029 |
1 |
|
|a DEBSZ
|b 446491063
|
029 |
1 |
|
|a DEBSZ
|b 493102051
|
029 |
1 |
|
|a NLGGC
|b 341401072
|
029 |
1 |
|
|a NZ1
|b 15122839
|
035 |
|
|
|a (OCoLC)784886692
|z (OCoLC)817083150
|
050 |
|
4 |
|a QA76.9.A25
|b M37 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Martin, Keith M.
|
245 |
1 |
0 |
|a Everyday Cryptography :
|b Fundamental Principles and Applications /
|c Keith M. Martin.
|
260 |
|
|
|a Oxford :
|b OUP Oxford,
|c 2012.
|
300 |
|
|
|a 1 online resource (553 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities.
|
505 |
8 |
|
|a Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity.
|
505 |
8 |
|
|a 6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary.
|
505 |
8 |
|
|a 8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys.
|
505 |
8 |
|
|a 11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks.
|
500 |
|
|
|a Mathematics Appendix.
|
520 |
|
|
|a Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=438461
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24244196
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24082524
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL886560
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 438461
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 362453
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7583075
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11260535
|
994 |
|
|
|a 92
|b IZTAP
|