Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Meditaciones 170
- Society & social sciences 161
- Biografa 133
- TomÆs de Aquino 132
- Comentarios 124
- Historia 106
- Educación pedagogía 93
- Església Catòlica 91
- Jesucristo- 90
- Obres anteriors al 1800 75
- Biblia 71
- Tratados y manuales 71
- Història 70
- Espiritualidad 58
- Ascetismo 57
- Teología dogmática 54
- Formaciðn 52
- Teologa dogmÆtica- 52
- Crtica e interpretaciðn 50
- Bíblia 43
- Historia / General 43
- Humanities 43
- Litúrgia 41
- Sermones 41
- Teologia 41
- Teologa dogmÆtica 40
- Vida Cristiana 39
- Mara 38
- Teologia moral 35
- Catequesis- 34
-
5921por Jimenez del Arenal, Antonio (O.SS.T.)
Publicado 1789Biblioteca Diocesana Bilbao (Otras Fuentes: Biblioteca Seminario Metropolitano de Oviedo)Libro -
5922
-
5923
-
5924Publicado 1768991006130679706719
-
5925
-
5926Publicado 2013Tabla de Contenidos: “…. -- Parodien auf Edgar Wallace 93 -- Georg Reik: Die Zarten 93 -- Ernst Penzoldt: Die Powenzbande 94 -- Oskar Jellinek: Das ganze Dorf war in Aufruhr 95 -- Alexander Lernet-Holenia: Nächtliche Hochzeit 96 -- Anton Kuh: Der unsterbliche Österreicher 96 -- A.E. Johann: Der unvollkommene Abenteurer. -- Ein Lebenslauf in zwölf Episoden 97 -- Hans Hell: M.d.R. …”
Libro electrónico -
5927Publicado 2012Tabla de Contenidos: “…Una aproximación conceptual y taxonómica de sus actividades de enseñanza-aprendizaje (AE/AD) / Enriqueta Barniol Terricabras, comunicación -- Israel Galván: ¿qué es la contemporaneidad en la danza española? …”
Accés llliure (RedIT) al capítol: "La interpretación en la danza. De la necesidad de un entrenamiento específico para bailarines" de Jordi Fàbrega
Libro -
5928Publicado 2018Tabla de Contenidos: “…Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 4: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition -- Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt…”
Libro electrónico -
5929Publicado 2022Tabla de Contenidos: “…Chapter 5 Cryptography -- Cryptography in Practice -- Fundamental Methods -- Comparative Strengths and Performance of Algorithms -- Key Length -- Cryptographic Objectives -- Diffusion -- Confusion -- Obfuscation -- Perfect Forward Secrecy -- Security Through Obscurity -- Historical Perspectives -- Algorithms -- Substitution Ciphers -- One-Time Pads -- Key Management -- Random Numbers -- Salting -- Hashing Functions -- Message Digest -- SHA -- RIPEMD -- Hashing Summary -- Symmetric Encryption -- DES -- 3DES -- AES -- CAST -- RC -- Blowfish -- Twofish -- IDEA -- ChaCha20 -- Cipher Modes -- Authenticated Encryption with Associated Data (AEAD) -- Block vs. …”
Libro electrónico -
5930Publicado 2011Tabla de Contenidos: “…Privacy Laws -- European Laws -- Ethics -- SANS Institute IT Code of Ethics -- Chapter Review -- Questions -- Answers -- Part II Cryptography and Applications -- Chapter 4 Cryptography -- Algorithms -- Hashing -- SHA -- RIPEMD -- Message Digest -- Hashing Summary -- Symmetric Encryption -- DES -- 3DES -- AES -- CAST -- RC -- Blowfish -- Twofish -- IDEA -- Symmetric Encryption Summary -- Asymmetric Encryption -- RSA -- Diffie-Hellman -- ElGamal -- ECC -- Asymmetric Encryption Summary -- Quantum Cryptography -- Steganography -- Cryptography Algorithm Use -- Confidentiality -- Integrity -- Nonrepudiation -- Authentication -- Digital Signatures -- Key Escrow -- Transport Encryption -- Cryptographic Applications -- Chapter Review -- Questions -- Answers -- Chapter 5 Public Key Infrastructure -- The Basics of Public Key Infrastructures -- Certificate Authorities -- Registration Authorities -- Local Registration Authorities…”
Libro electrónico -
5931Publicado 2017Tabla de Contenidos: “…Best practices to follow -- Conclusion -- Single sign-on -- Idea solution -- Advantages of an SSO solution -- Challenges in the classic method of authentication -- Security Assertion Markup Language -- The high-level overview of working -- Choosing the right identity provider -- Building an SSO from scratch -- Hosted Based Intrusion Detection System -- Exploring OSSEC -- File integrity monitoring -- Log monitoring and active response -- Conclusion -- The hardened image approach -- Implementing hardening standards in scalable environments -- Important to remember -- Conclusion -- Summary -- Chapter 5: Cryptography Network Security -- Introduction to cryptography -- Integrity -- Authenticity -- Real world scenario -- Non-repudiation -- Types of cryptography -- Symmetric key cryptography -- Stream cipher -- The encryption process -- The decryption process -- Advantages of stream ciphers -- Block cipher (AES) -- Padding -- Modes of block ciphers -- Message authentication codes -- The MAC approach -- The challenges with symmetric key storage -- Hardware security modules -- The challenges with HSM in on-premise -- A real-world scenario -- HSM on the cloud -- CloudHSM -- Key management service -- The basic working of AWS KMS -- Encrypting a function in KMS -- Decrypting a function in KMS -- Implementation -- Practical guide -- Configuring AWS CLI -- The decryption function -- Envelope encryption -- The encryption process -- The decryption process -- Implementation steps -- Practical implementation of envelope encryption -- Credential management system with KMS -- Implementation -- Best practices in key management -- Rotation life cycle for encryption keys -- Scenario 1-a single key for all data encryption -- Scenario 2-multiple keys for data encryption -- Protecting the access keys -- Audit trail is important -- Asymmetric key encryption…”
Libro electrónico -
5932
-
5933
-
5934
-
5935
-
5936
-
5937
-
5938Publicado 2022Tabla de Contenidos: “…Where the Symmetric Key Is Just Protected by a Password -- Working with and Indexing Encrypted Columns -- Migrating or Restoring a Database with Column Encryption -- Temporary Keys -- Encryption by Passphrase -- Protection of Key Passwords Being Sent to SQL Server -- Summary -- Appendix A: Glossary of Terms -- A -- Advanced Encryption Standard -- AES -- Always Encrypted -- Always Encrypted Wizard -- Asymmetric Encryption -- Asymmetric Key -- At-Rest Data -- Attestation -- Authenticator -- Automated Key Management -- Azure Key Vault -- B -- Backup Encryption -- C -- CA -- CEK -- Certificate -- Certification Authority -- Certificate Store -- CMK -- Code Integrity Policy -- Column Encryption Key -- Column Master Key -- D -- Data Encryption Standard -- Database Encryption Key -- Database Master Key -- DEK -- DES -- Deterministic Encryption -- Diffie Hellman -- DMA Protection -- DMK -- DPAPI -- E -- EKM -- Enclave -- Encryption Scan -- Extensible Key Management -- H -- Hardware Security Module -- Hash -- HGS -- Host Guardian Service -- Host Health Certificate -- Host Key -- HSM -- I -- In-Transit Encryption -- K -- Key Rotation -- P -- Parameterization for Always Encrypted -- Private Key -- Public Key -- R -- Randomized Encryption -- S -- Salt -- Secure Boot -- Secure Hashing Algorithm -- Service Master Key -- SHA -- SMK -- Symmetric Encryption -- Symmetric Key -- T -- TDE -- TDS -- Temporary Key -- Thumbprint -- TLS -- TPM -- TPM Baseline -- TPM Endorsement Key -- Transport Layer Security -- Transparent Data Encryption -- Trusted Platform Module -- V -- VBS -- Virtualization Based Security -- W -- Windows Data Protection API -- Appendix B: Encryption in the Cloud -- Azure VM -- Azure SQL Database or Managed Instance -- TDE -- Backup Encryption -- Always Encrypted with Secure Enclaves -- TLS -- AWS VM (EC2) -- EKM -- Always Encrypted with Secure Enclaves…”
Libro electrónico -
5939Publicado 2023Tabla de Contenidos: “…Cryptographic negotiation -- ClientHello -- ServerHello -- HelloRetryRequest -- Summary -- Chapter 13: TLS Handshake Protocol Revisited -- TLS client state machine -- TLS server state machine -- Finished message -- Early data -- Post-handshake messages -- The NewSessionTicket message -- Post-handshake authentication -- Key and initialization vector update -- OpenSSL s_client -- Installing OpenSSL -- Using openssl-s_client -- TLS experiments with openssl-s_client -- Summary -- Part 3: Off the Record -- Chapter 14: Block Ciphers and Their Modes of Operation -- The big picture -- General principles -- Advantages and disadvantages of block ciphers -- Confusion and diffusion -- Pseudorandom functions -- Pseudorandom permutations -- Substitution-permutation networks and Feistel networks -- Constants in cryptographic algorithms -- DES S-boxes -- Nothing-up-my-sleeves numbers -- The AES block cipher -- Overall structure -- Round function -- Key scheduling -- Modes of operation -- ECB mode -- CBC mode -- CBC-MAC -- OFB mode -- CTR mode -- XTS mode -- Block ciphers in TLS 1.3 -- Summary -- Chapter 15: Authenticated Encryption -- Preliminaries -- Indistinguishability under a chosen-plaintext attack -- Indistinguishability under a chosen-ciphertext attack -- Non-malleability under a chosen-plaintext attack -- Plaintext integrity -- Ciphertext integrity -- Authenticated encryption - generic composition -- Encrypt-and-MAC -- MAC-then-encrypt -- Encrypt-then-MAC -- Security of generic composition -- Authenticated ciphers -- Authenticated encryption with associated data -- Avoiding predictability with nonces -- Counter with cipher block chaining message authentication code (CCM) -- Authenticated encryption with CCM -- Authenticated decryption with CCM -- AEAD in TLS 1.3 -- Summary -- Chapter 16: The Galois Counter Mode -- Preliminaries -- The Galois field F2128…”
Libro electrónico -
5940Publicado 2022Tabla de Contenidos: “…Encoding using Huffman compression -- Remembering sequences with LZW -- Hiding Your Secrets with Cryptography -- Substituting characters -- Working with AES encryption -- Part 5 Challenging Difficult Problems -- Chapter 15 Working with Greedy Algorithms -- Deciding When It Is Better to Be Greedy -- Understanding why greedy is good -- Keeping greedy algorithms under control -- Considering NP complete problems -- Finding Out How Greedy Can Be Useful -- Arranging cached computer data -- Competing for resources -- Revisiting Huffman coding -- Chapter 16 Relying on Dynamic Programming -- Explaining Dynamic Programming -- Obtaining a historical basis -- Making problems dynamic -- Casting recursion dynamically -- Leveraging memoization -- Discovering the Best Dynamic Recipes -- Looking inside the knapsack -- Touring around cities -- Approximating string search -- Chapter 17 Using Randomized Algorithms -- Defining How Randomization Works -- Considering why randomization is needed -- Understanding how probability works -- Understanding distributions -- Simulating the use of the Monte Carlo method -- Putting Randomness into your Logic -- Calculating a median using quick select -- Doing simulations using Monte Carlo -- Ordering faster with quick sort -- Chapter 18 Performing Local Search -- Understanding Local Search -- Knowing the neighborhood -- Presenting local search tricks -- Explaining hill climbing with n-queens -- Discovering simulated annealing -- Avoiding repeats using Tabu Search -- Solving Satisfiability of Boolean Circuits -- Solving 2-SAT using randomization -- Implementing the Python code -- Realizing that the starting point is important -- Chapter 19 Employing Linear Programming -- Using Linear Functions as a Tool -- Grasping the basic math you need -- Learning to simplify when planning -- Working with geometry using simplex…”
Libro electrónico