Cargando…

Cyber security and IT infrastructure protection /

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solut...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, 2013.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing
  • 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm
  • The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2)
  • Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem
  • 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications