Cargando…

Cryptography : Infosec pro guide /

Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you wi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oriyano, Sean-Philip
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, ©2013.
Colección:Infosec pro guide.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn865474311
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 131216s2013 nyua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d QBX  |d OCLCQ  |d COCUF  |d OCLCO  |d B24X7  |d OCLCQ  |d DEBBG  |d DEBSZ  |d TEFOD  |d OCLCF  |d YDXCP  |d TEFOD  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCA  |d OCLCQ  |d EBLCP  |d TOH  |d RDF  |d OCLCQ  |d Z#6  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 864782618  |a 902816134  |a 1153029356  |a 1233229489  |a 1253688331 
020 |a 9780071794268  |q (electronic bk.) 
020 |a 0071794263  |q (electronic bk.) 
020 |z 9780071794251 
020 |z 0071794255  |q (pbk.) 
029 1 |a AU@  |b 000052404013 
029 1 |a AU@  |b 000066230758 
029 1 |a DEBSZ  |b 404324959 
035 |a (OCoLC)865474311  |z (OCoLC)864782618  |z (OCoLC)902816134  |z (OCoLC)1153029356  |z (OCoLC)1233229489  |z (OCoLC)1253688331 
037 |a CL0500000350  |b Safari Books Online 
037 |a F2B426F2-A3D6-4B54-8052-F89D2372906A  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a Z103 
082 0 4 |a 652/.8  |2 23 
049 |a UAMI 
100 1 |a Oriyano, Sean-Philip. 
245 1 0 |a Cryptography :  |b Infosec pro guide /  |c Sean-Philip Oriyano. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2013. 
300 |a 1 online resource (xviii, 300 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Infosec pro guide 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too. 
505 0 |a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography 
505 8 |a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block ... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look 
505 8 |a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority? 
505 8 |a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures 
505 8 |a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science) 
650 6 |a Cryptographie. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Cryptography  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
776 0 8 |i Print version:  |a Oriyano, Sean-Philip.  |t Cryptography.  |d New York : McGraw-Hill Education, ©2013  |z 9780071794251  |w (DLC) 2012474466  |w (OCoLC)856659884 
830 0 |a Infosec pro guide. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071794251/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00057465 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4959927 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6257423 
938 |a YBP Library Services  |b YANK  |n 12087462 
994 |a 92  |b IZTAP