Cryptography infosec pro guide

Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you wi...

Descripción completa

Detalles Bibliográficos
Otros Autores: Oriyano, Sean-Philip, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York : McGraw-Hill Education [2013]
Edición:1st edition
Colección:Infosec pro guide.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627572806719
Tabla de Contenidos:
  • Cover
  • About the Author
  • Title Page
  • Copyright Page
  • Contents
  • Acknowledgments
  • Introduction
  • Chapter 1: The Language of Cryptography
  • Fundamentals of Cryptography
  • Things to Know Upfront About Encryption
  • The Process of Encryption: A Closer Look
  • Encryption
  • Plaintext
  • Ciphertext
  • Algorithms and Ciphers
  • Keys
  • Putting It All Together
  • We've Covered
  • Chapter 2: History of Cryptography
  • Cryptography Overview
  • What Is Cryptography?
  • History of Cryptography
  • Modern Cryptography
  • We've Covered
  • Chapter 3: Components of Cryptography
  • Cryptography: Taking a Look Back and Looking Forward
  • Encryption
  • Visiting an Old Friend
  • Dissecting the Caesar Cipher
  • We've Covered
  • Chapter 4: Algorithms and Ciphers
  • A High-Level Look at Algorithms
  • Symmetric Algorithms
  • Common Symmetric Algorithms
  • So What's the Key?
  • Don't Forget Your Key
  • Don't Cross the Streams, You Block... Head
  • One-Time Pad
  • Which Is Better, Getting Hit with a Block or Drowning in a Stream?
  • Asymmetric/Public-Key Cryptography
  • We've Covered
  • Chapter 5: Hashing and Message Digests
  • Fundamentals of Hashing
  • A Closer Look
  • Hashing Algorithms
  • Applications of Hashing
  • Breaking Hashes and "Kicking Hash"
  • Lookup Tables
  • Rainbow Tables
  • Adding a Pinch of Salt
  • We've Covered
  • Chapter 6: Cryptanalysis and Code Breaking
  • Setting Things Straight
  • A Look at Cryptanalysis and Code Breaking
  • How it Works, Breaking the Codes
  • The Basics
  • We've Covered
  • Chapter 7: Public Key Infrastructure
  • So What Is PKI?
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
  • Digital Certificates
  • Authenticating the Certificate
  • Enter the PKI System
  • So What Is a Certification Authority?
  • Building a PKI Structure
  • After PKI Has Been Set Up
  • PKI in Action
  • Digital Signatures
  • We've Covered.
  • Chapter 8: Steganography
  • Steganography Overview
  • Steganography: A Brief History
  • So Why Steganography?
  • How Does Steganography Work?
  • Steganography in Audio
  • Steganography in Video
  • Steganography in Documents
  • Null Ciphers
  • Steganography on Hard Drives
  • Steganalysis: Detecting Hidden Information
  • Other Methods
  • Tools in Use
  • We've Covered
  • Chapter 9: Applied Cryptography
  • Less Theory, More Practical
  • Secure Sockets Layer (SSL)
  • Digital Signatures
  • Hashes
  • Automated Teller Machines
  • Drive Encryption
  • We've Covered
  • Chapter 10: Quantum Cryptography
  • So What Is Quantum Cryptography?
  • Traditional Cryptography: A Quick Review
  • Finding a Solution via Quantum Mechanics
  • So How Does Quantum Cryptography Work?
  • Photons as Information Carriers
  • But What About Eavesdropping?
  • So There Have to Be Problems, Right?
  • We've Covered
  • Chapter 11: The Future of Cryptography
  • Where Are We Now?
  • Personal Data Requirements
  • What About the Law?
  • The Law and Encryption
  • Military, Government, and the Individual
  • Key Escrow
  • Embedded Cryptography
  • We've Covered
  • Glossary
  • Index.