Cryptography Infosec pro guide

Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you wi...

Full description

Bibliographic Details
Main Author: Oriyano, Sean-Philip
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2013
Series:Infosec pro guide
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04832nmm a2200445 u 4500
001 EB001915841
003 EBX01000000000000001078743
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0071794263 
020 |a 9780071794268 
050 4 |a Z103 
100 1 |a Oriyano, Sean-Philip 
245 0 0 |a Cryptography  |b Infosec pro guide  |c Sean-Philip Oriyano 
260 |a New York  |b McGraw-Hill Education  |c 2013 
300 |a xviii, 300 pages  |b illustrations 
505 0 |a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block ... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look 
505 0 |a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography 
505 0 |a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority? 
505 0 |a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow 
505 0 |a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures 
653 |a Data encryption (Computer science) / fast 
653 |a Chiffrement (Informatique) 
653 |a Cryptography 
653 |a Cryptographie 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a Cryptography / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Infosec pro guide 
500 |a Includes index 
776 |z 0071794263 
776 |z 9780071794268 
776 |z 9780071794251 
776 |z 0071794255 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071794251/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 652/.8 
520 |a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too