Cryptography : Infosec pro guide /
Saved in:
Author / Creator: | Oriyano, Sean-Philip. |
---|---|
Imprint: | New York : McGraw-Hill Education, ©2013. |
Description: | 1 online resource (xviii, 300 pages) : illustrations |
Language: | English |
Series: | Infosec pro guide Infosec pro guide. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13617466 |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | 13617466 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 131216s2013 nyua o 001 0 eng d | ||
005 | 20241126151548.6 | ||
019 | |a 864782618 |a 902816134 |a 1153029356 |a 1233229489 |a 1253688331 | ||
020 | |a 9780071794268 |q (electronic bk.) | ||
020 | |a 0071794263 |q (electronic bk.) | ||
020 | |z 9780071794251 | ||
020 | |z 0071794255 |q (pbk.) | ||
035 | 9 | |a (OCLCCM-CC)865474311 | |
035 | |a (OCoLC)865474311 |z (OCoLC)864782618 |z (OCoLC)902816134 |z (OCoLC)1153029356 |z (OCoLC)1233229489 |z (OCoLC)1253688331 | ||
037 | |a CL0500000350 |b Safari Books Online | ||
037 | |a F2B426F2-A3D6-4B54-8052-F89D2372906A |b OverDrive, Inc. |n http://www.overdrive.com | ||
040 | |a UMI |b eng |e pn |c UMI |d COO |d QBX |d OCLCQ |d COCUF |d OCLCO |d B24X7 |d OCLCQ |d DEBBG |d DEBSZ |d TEFOD |d OCLCF |d YDXCP |d TEFOD |d OCLCQ |d TEFOD |d OCLCQ |d OCLCA |d OCLCQ |d EBLCP |d TOH |d RDF |d OCLCQ |d Z#6 |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a Z103 | |
100 | 1 | |a Oriyano, Sean-Philip. |0 http://id.loc.gov/authorities/names/no2011057700 | |
245 | 1 | 0 | |a Cryptography : |b Infosec pro guide / |c Sean-Philip Oriyano. |
260 | |a New York : |b McGraw-Hill Education, |c ©2013. | ||
300 | |a 1 online resource (xviii, 300 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Infosec pro guide | |
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
520 | |a Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too. | ||
505 | 0 | |a Cover -- About the Author -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Chapter 1: The Language of Cryptography -- Fundamentals of Cryptography -- Things to Know Upfront About Encryption -- The Process of Encryption: A Closer Look -- Encryption -- Plaintext -- Ciphertext -- Algorithms and Ciphers -- Keys -- Putting It All Together -- We've Covered -- Chapter 2: History of Cryptography -- Cryptography Overview -- What Is Cryptography? -- History of Cryptography -- Modern Cryptography -- We've Covered -- Chapter 3: Components of Cryptography | |
505 | 8 | |a Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend -- Dissecting the Caesar Cipher -- We've Covered -- Chapter 4: Algorithms and Ciphers -- A High-Level Look at Algorithms -- Symmetric Algorithms -- Common Symmetric Algorithms -- So What's the Key? -- Don't Forget Your Key -- Don't Cross the Streams, You Block ... Head -- One-Time Pad -- Which Is Better, Getting Hit with a Block or Drowning in a Stream? -- Asymmetric/Public-Key Cryptography -- We've Covered -- Chapter 5: Hashing and Message Digests -- Fundamentals of Hashing -- A Closer Look | |
505 | 8 | |a Hashing Algorithms -- Applications of Hashing -- Breaking Hashes and "Kicking Hash" -- Lookup Tables -- Rainbow Tables -- Adding a Pinch of Salt -- We've Covered -- Chapter 6: Cryptanalysis and Code Breaking -- Setting Things Straight -- A Look at Cryptanalysis and Code Breaking -- How it Works, Breaking the Codes -- The Basics -- We've Covered -- Chapter 7: Public Key Infrastructure -- So What Is PKI? -- Symmetric Encryption -- Asymmetric Encryption -- Hashing -- Digital Certificates -- Authenticating the Certificate -- Enter the PKI System -- So What Is a Certification Authority? | |
505 | 8 | |a Building a PKI Structure -- After PKI Has Been Set Up -- PKI in Action -- Digital Signatures -- We've Covered -- Chapter 8: Steganography -- Steganography Overview -- Steganography: A Brief History -- So Why Steganography? -- How Does Steganography Work? -- Steganography in Audio -- Steganography in Video -- Steganography in Documents -- Null Ciphers -- Steganography on Hard Drives -- Steganalysis: Detecting Hidden Information -- Other Methods -- Tools in Use -- We've Covered -- Chapter 9: Applied Cryptography -- Less Theory, More Practical -- Secure Sockets Layer (SSL) -- Digital Signatures | |
505 | 8 | |a Hashes -- Automated Teller Machines -- Drive Encryption -- We've Covered -- Chapter 10: Quantum Cryptography -- So What Is Quantum Cryptography? -- Traditional Cryptography: A Quick Review -- Finding a Solution via Quantum Mechanics -- So How Does Quantum Cryptography Work? -- Photons as Information Carriers -- But What About Eavesdropping? -- So There Have to Be Problems, Right? -- We've Covered -- Chapter 11: The Future of Cryptography -- Where Are We Now? -- Personal Data Requirements -- What About the Law? -- The Law and Encryption -- Military, Government, and the Individual -- Key Escrow | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 6 | |a Cryptographie. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
776 | 0 | 8 | |i Print version: |a Oriyano, Sean-Philip. |t Cryptography. |d New York : McGraw-Hill Education, ©2013 |z 9780071794251 |w (DLC) 2012474466 |w (OCoLC)856659884 |
830 | 0 | |a Infosec pro guide. |0 http://id.loc.gov/authorities/names/no2014016075 | |
856 | 4 | 0 | |u https://go.oreilly.com/uchicago/library/view/-/9780071794251/?ar |y O'Reilly |
929 | |a oclccm | ||
999 | f | f | |s 7ed60e2c-7c3e-4efd-a49a-3ae31af5c78e |i 963f9bf4-5294-4e0d-ae50-401cb2cdd23e |
928 | |t Library of Congress classification |a Z103 |l Online |c UC-FullText |u https://go.oreilly.com/uchicago/library/view/-/9780071794251/?ar |z O'Reilly |g ebooks |i 13760405 |