Cargando…

Cyber security and IT infrastructure protection /

"Part 1 Performance Analysis and Coaching 1 The role of performance analysis in elite netball competition structures 2 Soccer match analysis. A qualitative study with Portuguese First League coaches 3 Coach behaviour analysis within elite youth soccer 4 Performance analysis in professional socc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, [2014]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • 1. Fault Tolerance and Resilience in Cloud Computing Environments / Vincenzo Piuri
  • 1. Introduction
  • 2. Cloud Computing Fault Model
  • 3. Basic Concepts on Fault Tolerance
  • 4. Different Levels of Fault Tolerance in Cloud Computing
  • 5. Fault Tolerance against Crash Failures in Cloud Computing
  • 6. Fault Tolerance against Byzantine Failures in Cloud Computing
  • 7. Fault Tolerance as a Service in Cloud Computing
  • 8. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • Acknowledgments
  • References
  • 2. Data Encryption / Dr. Pramod Pandya
  • 1. Need for Cryptography
  • 2. Mathematical Prelude to Cryptography
  • 3. Classical Cryptography
  • 4. Modern Symmetric Ciphers
  • 5. Algebraic Structure
  • 6. The Internal Functions of Rijndael in AES Implementation
  • 7. Use of Modern Block Ciphers
  • 8. Public-Key Cryptography
  • 9. Cryptanalysis of RSA
  • 10. Diffie-Hellman Algorithm
  • 11. Elliptic Curve Cryptosystems
  • 12. Message Integrity and Authentication
  • 13. Triple Data Encryption Algorithm (TDEA) Block Cipher
  • 14. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 3. Public Key Infrastructure / Terence Spies
  • 1. Cryptographic Background
  • 2. Overview of PKI
  • 3. The X.509 Model
  • 4. X.509 Implementation Architectures
  • 5. X.509 Certificate Validation
  • 6. X.509 Certificate Revocation
  • 7. Server-Based Certificate Validity Protocol
  • 8. X.509 Bridge Certification Systems
  • 9. X.509 Certificate Format
  • 10. PKI Policy Description
  • 11. PKI Standards Organizations
  • 12. PGP Certificate Formats
  • 13. PGP PKI Implementations
  • 14. W3C
  • 15. Is PKI Secure?
  • 16. Alternative PKI Architectures
  • 17. Modified X.509 Architectures
  • 18. Alternative Key Management Models
  • 19. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 4. Physical Security Essentials / William Stallings
  • 1. Overview
  • 2. Physical Security Threats
  • 3. Physical Security Prevention and Mitigation Measures
  • 4. Recovery from Physical Security Breaches
  • 5. Threat Assessment, Planning, and Plan Implementation
  • 6. Example: A Corporate Physical Security Policy
  • 7. Integration of Physical and Logical Security
  • 8. Physical Security Checklist
  • 9. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 5. Disaster Recovery / Lauren Collins
  • 1. Introduction
  • 2. Measuring Risk and Avoiding Disaster
  • 3. The Business Impact Assessment (BIA)
  • 4. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 6. Biometrics / Luther Martin
  • 1. Relevant Standards
  • 2. Biometric System Architecture
  • 3. Using Biometric Systems
  • 4. Security Considerations
  • 5. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 7. Homeland Security / Bhushan Kapoor
  • 1. Statutory Authorities
  • 2. Homeland Security Presidential Directives
  • 3. Organizational Actions
  • 4. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 8. Cyber Warfare / Marco Slaviero
  • 1. Cyber Warfare Model
  • 2. Cyber Warfare Defined
  • 3. CW: Myth or Reality?
  • 4. Cyber Warfare: Making CW Possible
  • 5. Legal Aspects of CW
  • 6. Holistic View of Cyber Warfare
  • 7. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 9. System Security / Lauren Collins
  • 1. Foundations of Security
  • 2. Basic Countermeasures
  • 3. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 10. Securing the Infrastructure / Lauren Collins
  • 1. Communication Security Goals
  • 2. Attacks and Countermeasures
  • 3. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 11. Access Controls / Lauren Collins
  • 1. Infrastructure Weaknesses: DAC, MAC, and RBAC
  • 2. Strengthening the Infrastructure: Authentication Systems
  • 3. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 12. Assessments and Audits / Lauren Collins
  • 1. Assessing Vulnerabilities and Risk: Penetration Testing and Vulnerability Assessments
  • 2. Risk Management: Quantitative Risk Measurements
  • 3. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 13. Fundamentals of Cryptography / Scott R. Ellis
  • 1. Assuring Privacy with Encryption
  • 2. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 14. Satellite Cyber Attack Search and Destroy / Jeffrey Bardin
  • 1. Hacks, Interference, and Jamming
  • 2. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 15. Advanced Data Encryption / Pramod Pandya
  • 1. Mathematical Concepts Reviewed
  • 2. The RSA Cryptosystem
  • 3. Summary
  • Chapter Review Questions/Exercises
  • Exercise.