Cryptography : Infosec pro guide /
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you wi...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
©2013.
|
Colección: | Infosec pro guide.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- About the Author
- Title Page
- Copyright Page
- Contents
- Acknowledgments
- Introduction
- Chapter 1: The Language of Cryptography
- Fundamentals of Cryptography
- Things to Know Upfront About Encryption
- The Process of Encryption: A Closer Look
- Encryption
- Plaintext
- Ciphertext
- Algorithms and Ciphers
- Keys
- Putting It All Together
- We've Covered
- Chapter 2: History of Cryptography
- Cryptography Overview
- What Is Cryptography?
- History of Cryptography
- Modern Cryptography
- We've Covered
- Chapter 3: Components of Cryptography
- Cryptography: Taking a Look Back and Looking Forward
- Encryption
- Visiting an Old Friend
- Dissecting the Caesar Cipher
- We've Covered
- Chapter 4: Algorithms and Ciphers
- A High-Level Look at Algorithms
- Symmetric Algorithms
- Common Symmetric Algorithms
- So What's the Key?
- Don't Forget Your Key
- Don't Cross the Streams, You Block ... Head
- One-Time Pad
- Which Is Better, Getting Hit with a Block or Drowning in a Stream?
- Asymmetric/Public-Key Cryptography
- We've Covered
- Chapter 5: Hashing and Message Digests
- Fundamentals of Hashing
- A Closer Look
- Hashing Algorithms
- Applications of Hashing
- Breaking Hashes and "Kicking Hash"
- Lookup Tables
- Rainbow Tables
- Adding a Pinch of Salt
- We've Covered
- Chapter 6: Cryptanalysis and Code Breaking
- Setting Things Straight
- A Look at Cryptanalysis and Code Breaking
- How it Works, Breaking the Codes
- The Basics
- We've Covered
- Chapter 7: Public Key Infrastructure
- So What Is PKI?
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- Digital Certificates
- Authenticating the Certificate
- Enter the PKI System
- So What Is a Certification Authority?
- Building a PKI Structure
- After PKI Has Been Set Up
- PKI in Action
- Digital Signatures
- We've Covered
- Chapter 8: Steganography
- Steganography Overview
- Steganography: A Brief History
- So Why Steganography?
- How Does Steganography Work?
- Steganography in Audio
- Steganography in Video
- Steganography in Documents
- Null Ciphers
- Steganography on Hard Drives
- Steganalysis: Detecting Hidden Information
- Other Methods
- Tools in Use
- We've Covered
- Chapter 9: Applied Cryptography
- Less Theory, More Practical
- Secure Sockets Layer (SSL)
- Digital Signatures
- Hashes
- Automated Teller Machines
- Drive Encryption
- We've Covered
- Chapter 10: Quantum Cryptography
- So What Is Quantum Cryptography?
- Traditional Cryptography: A Quick Review
- Finding a Solution via Quantum Mechanics
- So How Does Quantum Cryptography Work?
- Photons as Information Carriers
- But What About Eavesdropping?
- So There Have to Be Problems, Right?
- We've Covered
- Chapter 11: The Future of Cryptography
- Where Are We Now?
- Personal Data Requirements
- What About the Law?
- The Law and Encryption
- Military, Government, and the Individual
- Key Escrow