Cargando…

Cyber security and IT infrastructure protection /

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solut...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, 2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn857277688
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 130830s2013 ne ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d OPELS  |d OCLCQ  |d OCLCO  |d OCLCF  |d UIU  |d OCLCQ  |d CDX  |d UMI  |d COO  |d TEFOD  |d DEBBG  |d DEBSZ  |d OCLCO  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d D6H  |d ICG  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d S2H  |d OCLCO  |d HS0  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 861507609  |a 861745283  |a 865474317  |a 883337096 
020 |a 1299819494  |q (electronic bk.) 
020 |a 9781299819498  |q (electronic bk.) 
020 |a 0124200478 
020 |a 9780124200470 
020 |z 9780124166813 
020 |z 0124166814 
029 1 |a AU@  |b 000052404603 
029 1 |a CHNEW  |b 000898845 
029 1 |a CHNEW  |b 001000943 
029 1 |a CHNEW  |b 001026505 
029 1 |a DEBBG  |b BV041777986 
029 1 |a DEBBG  |b BV042314343 
029 1 |a DEBSZ  |b 404324495 
029 1 |a DEBSZ  |b 405350384 
029 1 |a DEBSZ  |b 431497265 
029 1 |a NZ1  |b 15197935 
029 1 |a ZWZ  |b 178523321 
029 1 |a AU@  |b 000066230725 
029 1 |a DKDLA  |b 820120-katalog:999937993805765 
035 |a (OCoLC)857277688  |z (OCoLC)861507609  |z (OCoLC)861745283  |z (OCoLC)865474317  |z (OCoLC)883337096 
037 |a 513200  |b MIL 
037 |a F529F4B1-61D9-4871-BE84-E00CE46D1925  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.875.I57 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Cyber security and IT infrastructure protection /  |c edited by John R. Vacca. 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding. Chapter Review Questions/Exercises and Case Studies. Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc. Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing 
505 8 |a 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm 
505 8 |a The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2) 
505 8 |a Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem 
505 8 |a 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet  |x Security measures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 7 |a Internet  |x Security measures  |2 fast 
700 1 |a Vacca, John R. 
776 0 8 |i Print version:  |z 9780124166813 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124166813/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 26053959 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26053959 
994 |a 92  |b IZTAP