Cargando…

Cyber security and IT infrastructure protection /

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solut...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 SCIDIR_ocn857277688
003 OCoLC
005 20231117044916.0
006 m o d
007 cr |n|||||||||
008 130830s2013 ne ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d OPELS  |d OCLCQ  |d OCLCO  |d OCLCF  |d UIU  |d OCLCQ  |d CDX  |d UMI  |d COO  |d TEFOD  |d DEBBG  |d DEBSZ  |d OCLCO  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d D6H  |d ICG  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d S2H  |d OCLCO  |d HS0  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 861507609  |a 861745283  |a 865474317  |a 883337096 
020 |a 1299819494  |q (electronic bk.) 
020 |a 9781299819498  |q (electronic bk.) 
020 |a 0124200478 
020 |a 9780124200470 
020 |z 9780124166813 
020 |z 0124166814 
035 |a (OCoLC)857277688  |z (OCoLC)861507609  |z (OCoLC)861745283  |z (OCoLC)865474317  |z (OCoLC)883337096 
050 4 |a TK5105.875.I57 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Cyber security and IT infrastructure protection /  |c edited by John R. Vacca. 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding. Chapter Review Questions/Exercises and Case Studies. Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc. Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing 
505 8 |a 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm 
505 8 |a The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2) 
505 8 |a Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem 
505 8 |a 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications 
650 0 |a Internet  |x Security measures. 
650 6 |a Internet  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0460601 
650 7 |a Internet  |x Security measures  |2 fast  |0 (OCoLC)fst01751426 
700 1 |a Vacca, John R. 
776 0 8 |i Print version:  |z 9780124166813 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780124166813  |z Texto completo