Mostrando 4,181 - 4,200 Resultados de 7,022 Para Buscar '"Æ"', tiempo de consulta: 0.08s Limitar resultados
  1. 4181
    Libro
  2. 4182
  3. 4183
  4. 4184
    Libro
  5. 4185
    por Ubaldi, Baldo Degli (1327-1400)
    Publicado 1576
    Libro
  6. 4186
  7. 4187
    Publicado 2005
    “…Se estimaron proporciones de muestras positivas de Ae. albopictus, por municipio, por año, utilizando Excel. …”
    Enlace del recurso
    Artículo digital
  8. 4188
  9. 4189
  10. 4190
    991007966359706719
  11. 4191
    Libro
  12. 4192
  13. 4193
  14. 4194
    Publicado 2020
    Tabla de Contenidos: “…Henry -- Unruly subjects under colonial and postcolonial modernity -- Ritual specialists in colonial drag: shamanic interventions in 1920s Korea / Merose Hwang -- Telling queer time in a straight empire: Yi Sang's 'Wings' (1936) / John Whittier Treat -- Problematizing love: the intimate event and same-sex love in colonial Korea / Pei Jean Chen -- Femininity under the wartime system and the symptomacity of female same-sex love / Shin-ae Ha (Translated by Kyunghee Eo) -- A female-dressed man sings a national epic: the film Male Kisaeng and the politics of gender and sexuality in 1960s South Korea / Chung-kang Kim -- Queer lives as cautionary tales: female homoeroticism and the heteropatriarchal imagination of authoritarian South Korea / Todd A. …”
    Libro electrónico
  15. 4195
    Publicado 2018
    Tabla de Contenidos: “…-- Windows password hashes -- Getting hashes with Cain -- MD4 and Unicode -- Cracking hashes with Google -- Cracking hashes with wordlists -- Linux password hashes -- Challenge 1 - cracking Windows hashes -- Challenge 2 - cracking many-round hashes -- Challenge 3 - cracking Linux hashes -- Summary -- Chapter 3: Strong Encryption -- Strong encryption with AES -- ECB and CBC modes -- ECB -- CBC -- Padding oracle attack -- Strong encryption with RSA -- Public key encryption -- RSA algorithm -- Implementation in Python -- Challenge - cracking RSA with similar factors -- Large integers in Python -- What's next? …”
    Libro electrónico
  16. 4196
    por Burns, Robert, 1759-1796
    Publicado 1998
    Tabla de Contenidos: “…O lay thy loof ; Altho' my back ; Gude ale (3:21) -- Robin shure in hairst (2:19) -- My Harry ; A' the lads ' The white cockade (3:45) -- O my luve's like a red, red rose (2:30) -- Louis what reck I by thee ; In Mauchline (2:49) -- Hey, how my Johnie lad (1:57) -- O, when she come ben, she bobbed ; O Mally's meek (2:35) -- The Ploughman (2:17) -- Thou gloomy December (4:25) -- The Shepherd's wife (2:47) -- O, whar gat ye that hauver-meal bannock (2:49) -- Sir John Cope (2:39) -- Dost ast me, why I send thee here ; O can ye labour lea (3:15) -- Tibbie Fowler o' the glen (2:45) -- The Small birds rejoice (3:08) -- I hae been at Crookie-Den (1:46) -- O May, thy morn (2:58) -- As I went out ae May morning (1:49) -- I maun hae a wife ; Young and souple was I (2:48) -- Awa' wi' your witchcraft (1:58) -- One night as I did wander ; Out over the Forth (2:10) -- O, luve will venture in (1:55)…”
    CDROM
  17. 4197
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  18. 4198
    Publicado 2021
    Tabla de Contenidos: “…Implementing Hash Functions -- Implementing SHA-1/256/368/512, MD2, and MD5 -- Conclusion -- References -- Chapter 9: Block Ciphers: DES and AES -- Preliminaries -- Networks Based on Substitution and Permutation -- Attacks Based on Linear Cryptanalysis -- Attacks Based on Differential Cryptanalysis -- The Data Encryption Standard (DES) -- DES Description -- Implementation of DES -- The Advanced Encryption System (AES) -- SubBytes Operations -- The ShiftRows Operation -- The MixColumn Operation -- The AddRoundKey Operation -- Key Expansion -- InvSubBytes Operation -- InvShiftRows Operation -- InvMixColumns Operation -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- Knapsack Approach -- The Algorithms -- Conclusion -- References -- Chapter 11: Formal Techniques for Cryptography -- Probability Theory -- Random Variables -- Birthday Problem -- Entropy -- Randomness in Cryptography -- Conclusion -- References -- Chapter 12: Visual Cryptography -- Conclusion -- References -- Chapter 13: Chaos-Based Cryptography -- Chaos Maps and Functions -- Logistic Map -- Chaos Theory in Cryptography -- Sensitivity to Initial Conditions -- Conclusion -- References -- Chapter 14: Steganography -- Algorithms and Methods for Different Steganography Types -- Steganography for Image Files -- Steganography for Audio Files -- Steganography for Video Files -- Practical Implementation -- Implementing the Least Significant Bit (LSB) Method -- Implementing the Histogram Analysis Method -- Conclusion -- References -- Index…”
    Libro electrónico
  19. 4199
    por Dyer, Russell J. T.
    Publicado 2005
    Tabla de Contenidos:
    Libro electrónico
  20. 4200