Cyber security and IT infrastructure protection /
"Part 1 Performance Analysis and Coaching 1 The role of performance analysis in elite netball competition structures 2 Soccer match analysis. A qualitative study with Portuguese First League coaches 3 Coach behaviour analysis within elite youth soccer 4 Performance analysis in professional socc...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress,
[2014]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- 1. Fault Tolerance and Resilience in Cloud Computing Environments / Vincenzo Piuri
- 1. Introduction
- 2. Cloud Computing Fault Model
- 3. Basic Concepts on Fault Tolerance
- 4. Different Levels of Fault Tolerance in Cloud Computing
- 5. Fault Tolerance against Crash Failures in Cloud Computing
- 6. Fault Tolerance against Byzantine Failures in Cloud Computing
- 7. Fault Tolerance as a Service in Cloud Computing
- 8. Summary
- Chapter Review Questions/Exercises
- Exercise
- Acknowledgments
- References
- 2. Data Encryption / Dr. Pramod Pandya
- 1. Need for Cryptography
- 2. Mathematical Prelude to Cryptography
- 3. Classical Cryptography
- 4. Modern Symmetric Ciphers
- 5. Algebraic Structure
- 6. The Internal Functions of Rijndael in AES Implementation
- 7. Use of Modern Block Ciphers
- 8. Public-Key Cryptography
- 9. Cryptanalysis of RSA
- 10. Diffie-Hellman Algorithm
- 11. Elliptic Curve Cryptosystems
- 12. Message Integrity and Authentication
- 13. Triple Data Encryption Algorithm (TDEA) Block Cipher
- 14. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 3. Public Key Infrastructure / Terence Spies
- 1. Cryptographic Background
- 2. Overview of PKI
- 3. The X.509 Model
- 4. X.509 Implementation Architectures
- 5. X.509 Certificate Validation
- 6. X.509 Certificate Revocation
- 7. Server-Based Certificate Validity Protocol
- 8. X.509 Bridge Certification Systems
- 9. X.509 Certificate Format
- 10. PKI Policy Description
- 11. PKI Standards Organizations
- 12. PGP Certificate Formats
- 13. PGP PKI Implementations
- 14. W3C
- 15. Is PKI Secure?
- 16. Alternative PKI Architectures
- 17. Modified X.509 Architectures
- 18. Alternative Key Management Models
- 19. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 4. Physical Security Essentials / William Stallings
- 1. Overview
- 2. Physical Security Threats
- 3. Physical Security Prevention and Mitigation Measures
- 4. Recovery from Physical Security Breaches
- 5. Threat Assessment, Planning, and Plan Implementation
- 6. Example: A Corporate Physical Security Policy
- 7. Integration of Physical and Logical Security
- 8. Physical Security Checklist
- 9. Summary
- Chapter Review Questions/Exercises
- Exercise
- 5. Disaster Recovery / Lauren Collins
- 1. Introduction
- 2. Measuring Risk and Avoiding Disaster
- 3. The Business Impact Assessment (BIA)
- 4. Summary
- Chapter Review Questions/Exercises
- Exercise
- 6. Biometrics / Luther Martin
- 1. Relevant Standards
- 2. Biometric System Architecture
- 3. Using Biometric Systems
- 4. Security Considerations
- 5. Summary
- Chapter Review Questions/Exercises
- Exercise
- 7. Homeland Security / Bhushan Kapoor
- 1. Statutory Authorities
- 2. Homeland Security Presidential Directives
- 3. Organizational Actions
- 4. Summary
- Chapter Review Questions/Exercises
- Exercise
- 8. Cyber Warfare / Marco Slaviero
- 1. Cyber Warfare Model
- 2. Cyber Warfare Defined
- 3. CW: Myth or Reality?
- 4. Cyber Warfare: Making CW Possible
- 5. Legal Aspects of CW
- 6. Holistic View of Cyber Warfare
- 7. Summary
- Chapter Review Questions/Exercises
- Exercise
- 9. System Security / Lauren Collins
- 1. Foundations of Security
- 2. Basic Countermeasures
- 3. Summary
- Chapter Review Questions/Exercises
- Exercise
- 10. Securing the Infrastructure / Lauren Collins
- 1. Communication Security Goals
- 2. Attacks and Countermeasures
- 3. Summary
- Chapter Review Questions/Exercises
- Exercise
- 11. Access Controls / Lauren Collins
- 1. Infrastructure Weaknesses: DAC, MAC, and RBAC
- 2. Strengthening the Infrastructure: Authentication Systems
- 3. Summary
- Chapter Review Questions/Exercises
- Exercise
- 12. Assessments and Audits / Lauren Collins
- 1. Assessing Vulnerabilities and Risk: Penetration Testing and Vulnerability Assessments
- 2. Risk Management: Quantitative Risk Measurements
- 3. Summary
- Chapter Review Questions/Exercises
- Exercise
- 13. Fundamentals of Cryptography / Scott R. Ellis
- 1. Assuring Privacy with Encryption
- 2. Summary
- Chapter Review Questions/Exercises
- Exercise
- 14. Satellite Cyber Attack Search and Destroy / Jeffrey Bardin
- 1. Hacks, Interference, and Jamming
- 2. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 15. Advanced Data Encryption / Pramod Pandya
- 1. Mathematical Concepts Reviewed
- 2. The RSA Cryptosystem
- 3. Summary
- Chapter Review Questions/Exercises
- Exercise.