|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn857277688 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130830s2013 ne ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OCLCQ
|d OPELS
|d OCLCQ
|d OCLCO
|d OCLCF
|d UIU
|d OCLCQ
|d CDX
|d UMI
|d COO
|d TEFOD
|d DEBBG
|d DEBSZ
|d OCLCO
|d TEFOD
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d ZCU
|d MERUC
|d OCLCQ
|d U3W
|d D6H
|d ICG
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d S2H
|d OCLCO
|d HS0
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 861507609
|a 861745283
|a 865474317
|a 883337096
|
020 |
|
|
|a 1299819494
|q (electronic bk.)
|
020 |
|
|
|a 9781299819498
|q (electronic bk.)
|
020 |
|
|
|a 0124200478
|
020 |
|
|
|a 9780124200470
|
020 |
|
|
|z 9780124166813
|
020 |
|
|
|z 0124166814
|
029 |
1 |
|
|a AU@
|b 000052404603
|
029 |
1 |
|
|a CHNEW
|b 000898845
|
029 |
1 |
|
|a CHNEW
|b 001000943
|
029 |
1 |
|
|a CHNEW
|b 001026505
|
029 |
1 |
|
|a DEBBG
|b BV041777986
|
029 |
1 |
|
|a DEBBG
|b BV042314343
|
029 |
1 |
|
|a DEBSZ
|b 404324495
|
029 |
1 |
|
|a DEBSZ
|b 405350384
|
029 |
1 |
|
|a DEBSZ
|b 431497265
|
029 |
1 |
|
|a NZ1
|b 15197935
|
029 |
1 |
|
|a ZWZ
|b 178523321
|
029 |
1 |
|
|a AU@
|b 000066230725
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999937993805765
|
035 |
|
|
|a (OCoLC)857277688
|z (OCoLC)861507609
|z (OCoLC)861745283
|z (OCoLC)865474317
|z (OCoLC)883337096
|
037 |
|
|
|a 513200
|b MIL
|
037 |
|
|
|a F529F4B1-61D9-4871-BE84-E00CE46D1925
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.875.I57
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyber security and IT infrastructure protection /
|c edited by John R. Vacca.
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Syngress,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding. Chapter Review Questions/Exercises and Case Studies. Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc. Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing
|
505 |
8 |
|
|a 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm
|
505 |
8 |
|
|a The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2)
|
505 |
8 |
|
|a Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem
|
505 |
8 |
|
|a 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
700 |
1 |
|
|a Vacca, John R.
|
776 |
0 |
8 |
|i Print version:
|z 9780124166813
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124166813/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 26053959
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26053959
|
994 |
|
|
|a 92
|b IZTAP
|