|
|
|
|
LEADER |
04832nmm a2200445 u 4500 |
001 |
EB001915841 |
003 |
EBX01000000000000001078743 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0071794263
|
020 |
|
|
|a 9780071794268
|
050 |
|
4 |
|a Z103
|
100 |
1 |
|
|a Oriyano, Sean-Philip
|
245 |
0 |
0 |
|a Cryptography
|b Infosec pro guide
|c Sean-Philip Oriyano
|
260 |
|
|
|a New York
|b McGraw-Hill Education
|c 2013
|
300 |
|
|
|a xviii, 300 pages
|b illustrations
|
505 |
0 |
|
|a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block ... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look
|
505 |
0 |
|
|a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography
|
505 |
0 |
|
|a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority?
|
505 |
0 |
|
|a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow
|
505 |
0 |
|
|a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures
|
653 |
|
|
|a Data encryption (Computer science) / fast
|
653 |
|
|
|a Chiffrement (Informatique)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Cryptographie
|
653 |
|
|
|a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524
|
653 |
|
|
|a Cryptography / fast
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Infosec pro guide
|
500 |
|
|
|a Includes index
|
776 |
|
|
|z 0071794263
|
776 |
|
|
|z 9780071794268
|
776 |
|
|
|z 9780071794251
|
776 |
|
|
|z 0071794255
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071794251/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 652/.8
|
520 |
|
|
|a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too
|