Cryptography : Infosec pro guide /

Saved in:
Bibliographic Details
Author / Creator:Oriyano, Sean-Philip.
Imprint:New York : McGraw-Hill Education, ©2013.
Description:1 online resource (xviii, 300 pages) : illustrations
Language:English
Series:Infosec pro guide
Infosec pro guide.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13617466
Hidden Bibliographic Details
ISBN:9780071794268
0071794263
9780071794251
0071794255
Notes:Includes index.
Print version record.
Summary:Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too.
Other form:Print version: Oriyano, Sean-Philip. Cryptography. New York : McGraw-Hill Education, ©2013 9780071794251

MARC

LEADER 00000cam a2200000 a 4500
001 13617466
006 m o d
007 cr unu||||||||
008 131216s2013 nyua o 001 0 eng d
005 20241126151548.6
019 |a 864782618  |a 902816134  |a 1153029356  |a 1233229489  |a 1253688331 
020 |a 9780071794268  |q (electronic bk.) 
020 |a 0071794263  |q (electronic bk.) 
020 |z 9780071794251 
020 |z 0071794255  |q (pbk.) 
035 9 |a (OCLCCM-CC)865474311 
035 |a (OCoLC)865474311  |z (OCoLC)864782618  |z (OCoLC)902816134  |z (OCoLC)1153029356  |z (OCoLC)1233229489  |z (OCoLC)1253688331 
037 |a CL0500000350  |b Safari Books Online 
037 |a F2B426F2-A3D6-4B54-8052-F89D2372906A  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d QBX  |d OCLCQ  |d COCUF  |d OCLCO  |d B24X7  |d OCLCQ  |d DEBBG  |d DEBSZ  |d TEFOD  |d OCLCF  |d YDXCP  |d TEFOD  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCA  |d OCLCQ  |d EBLCP  |d TOH  |d RDF  |d OCLCQ  |d Z#6  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
049 |a MAIN 
050 4 |a Z103 
100 1 |a Oriyano, Sean-Philip.  |0 http://id.loc.gov/authorities/names/no2011057700 
245 1 0 |a Cryptography :  |b Infosec pro guide /  |c Sean-Philip Oriyano. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2013. 
300 |a 1 online resource (xviii, 300 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Infosec pro guide 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too. 
505 0 |a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography 
505 8 |a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block ... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look 
505 8 |a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority? 
505 8 |a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures 
505 8 |a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 6 |a Cryptographie. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Cryptography  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
776 0 8 |i Print version:  |a Oriyano, Sean-Philip.  |t Cryptography.  |d New York : McGraw-Hill Education, ©2013  |z 9780071794251  |w (DLC) 2012474466  |w (OCoLC)856659884 
830 0 |a Infosec pro guide.  |0 http://id.loc.gov/authorities/names/no2014016075 
856 4 0 |u https://go.oreilly.com/uchicago/library/view/-/9780071794251/?ar  |y O'Reilly 
929 |a oclccm 
999 f f |s 7ed60e2c-7c3e-4efd-a49a-3ae31af5c78e  |i 963f9bf4-5294-4e0d-ae50-401cb2cdd23e 
928 |t Library of Congress classification  |a Z103  |l Online  |c UC-FullText  |u https://go.oreilly.com/uchicago/library/view/-/9780071794251/?ar  |z O'Reilly  |g ebooks  |i 13760405