|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn865474311 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
131216s2013 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d QBX
|d OCLCQ
|d COCUF
|d OCLCO
|d B24X7
|d OCLCQ
|d DEBBG
|d DEBSZ
|d TEFOD
|d OCLCF
|d YDXCP
|d TEFOD
|d OCLCQ
|d TEFOD
|d OCLCQ
|d OCLCA
|d OCLCQ
|d EBLCP
|d TOH
|d RDF
|d OCLCQ
|d Z#6
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 864782618
|a 902816134
|a 1153029356
|a 1233229489
|a 1253688331
|
020 |
|
|
|a 9780071794268
|q (electronic bk.)
|
020 |
|
|
|a 0071794263
|q (electronic bk.)
|
020 |
|
|
|z 9780071794251
|
020 |
|
|
|z 0071794255
|q (pbk.)
|
029 |
1 |
|
|a AU@
|b 000052404013
|
029 |
1 |
|
|a AU@
|b 000066230758
|
029 |
1 |
|
|a DEBSZ
|b 404324959
|
035 |
|
|
|a (OCoLC)865474311
|z (OCoLC)864782618
|z (OCoLC)902816134
|z (OCoLC)1153029356
|z (OCoLC)1233229489
|z (OCoLC)1253688331
|
037 |
|
|
|a CL0500000350
|b Safari Books Online
|
037 |
|
|
|a F2B426F2-A3D6-4B54-8052-F89D2372906A
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a Z103
|
082 |
0 |
4 |
|a 652/.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Oriyano, Sean-Philip.
|
245 |
1 |
0 |
|a Cryptography :
|b Infosec pro guide /
|c Sean-Philip Oriyano.
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c ©2013.
|
300 |
|
|
|a 1 online resource (xviii, 300 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Infosec pro guide
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too.
|
505 |
0 |
|
|a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography
|
505 |
8 |
|
|a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block ... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look
|
505 |
8 |
|
|a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority?
|
505 |
8 |
|
|a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures
|
505 |
8 |
|
|a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Oriyano, Sean-Philip.
|t Cryptography.
|d New York : McGraw-Hill Education, ©2013
|z 9780071794251
|w (DLC) 2012474466
|w (OCoLC)856659884
|
830 |
|
0 |
|a Infosec pro guide.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071794251/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00057465
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4959927
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6257423
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12087462
|
994 |
|
|
|a 92
|b IZTAP
|