Cryptography : Infosec pro guide /
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you wi...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
New York :
McGraw-Hill Education,
©2013.
|
Series: | Infosec pro guide.
|
Subjects: | |
Online Access: | CONNECT CONNECT |
LEADER | 06124cam a2200601Ia 4500 | ||
---|---|---|---|
001 | in00006061217 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 131216s2013 nyua o 001 0 eng d | ||
005 | 20220714133016.0 | ||
010 | |a 2012474466 | ||
035 | |a 1WRLDSHRocn865474311 | ||
040 | |a UMI |b eng |e pn |c UMI |d COO |d QBX |d OCLCQ |d COCUF |d OCLCO |d B24X7 |d OCLCQ |d DEBBG |d DEBSZ |d TEFOD |d OCLCF |d YDXCP |d TEFOD |d OCLCQ |d TEFOD |d OCLCQ |d OCLCA |d OCLCQ |d EBLCP |d TOH |d RDF |d OCLCQ |d Z#6 |d VT2 |d OCLCO | ||
019 | |a 864782618 |a 902816134 |a 1153029356 |a 1233229489 |a 1253688331 | ||
020 | |a 9780071794268 |q (electronic bk.) | ||
020 | |a 0071794263 |q (electronic bk.) | ||
020 | |z 9780071794251 | ||
020 | |z 0071794255 |q (pbk.) | ||
035 | |a (OCoLC)865474311 |z (OCoLC)864782618 |z (OCoLC)902816134 |z (OCoLC)1153029356 |z (OCoLC)1233229489 |z (OCoLC)1253688331 | ||
037 | |a CL0500000350 |b Safari Books Online | ||
037 | |a F2B426F2-A3D6-4B54-8052-F89D2372906A |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a Z103 | |
082 | 0 | 4 | |a 652/.8 |2 23 |
049 | |a TXMM | ||
100 | 1 | |a Oriyano, Sean-Philip. | |
245 | 1 | 0 | |a Cryptography : |b Infosec pro guide / |c Sean-Philip Oriyano. |
260 | |a New York : |b McGraw-Hill Education, |c ©2013. | ||
300 | |a 1 online resource (xviii, 300 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Infosec pro guide | |
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
520 | |a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too. | ||
505 | 0 | |a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography | |
505 | 8 | |a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look | |
505 | 8 | |a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority? | |
505 | 8 | |a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures | |
505 | 8 | |a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow | |
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science) | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |a Oriyano, Sean-Philip. |t Cryptography. |d New York : McGraw-Hill Education, ©2013 |z 9780071794251 |w (DLC) 2012474466 |w (OCoLC)856659884 |
830 | 0 | |a Infosec pro guide. | |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780071794251/?ar |z CONNECT |3 O'Reilly |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 958c35e6-4806-40fe-8528-a34b2d76b91d |i 778e38d1-2635-416e-9b4f-3e5d2f11ddfd |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 1 |e Z103 |h Library of Congress classification |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780071794251/?ar |z CONNECT |