Mostrando 5,921 - 5,940 Resultados de 6,992 Para Buscar '"Æ"', tiempo de consulta: 0.11s Limitar resultados
  1. 5921
  2. 5922
  3. 5923
  4. 5924
  5. 5925
  6. 5926
    Publicado 2013
    Tabla de Contenidos: “…. -- Parodien auf Edgar Wallace 93 -- Georg Reik: Die Zarten 93 -- Ernst Penzoldt: Die Powenzbande 94 -- Oskar Jellinek: Das ganze Dorf war in Aufruhr 95 -- Alexander Lernet-Holenia: Nächtliche Hochzeit 96 -- Anton Kuh: Der unsterbliche Österreicher 96 -- A.E. Johann: Der unvollkommene Abenteurer. -- Ein Lebenslauf in zwölf Episoden 97 -- Hans Hell: M.d.R. …”
    Libro electrónico
  7. 5927
    Publicado 2012
    Tabla de Contenidos: “…Una aproximación conceptual y taxonómica de sus actividades de enseñanza-aprendizaje (AE/AD) / Enriqueta Barniol Terricabras, comunicación -- Israel Galván: ¿qué es la contemporaneidad en la danza española? …”
    Accés llliure (RedIT) al capítol: "La interpretación en la danza. De la necesidad de un entrenamiento específico para bailarines" de Jordi Fàbrega
    Libro
  8. 5928
    Publicado 2018
    Tabla de Contenidos: “…Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 4: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition -- Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt…”
    Libro electrónico
  9. 5929
    Publicado 2022
    Tabla de Contenidos: “…Chapter 5 Cryptography -- Cryptography in Practice -- Fundamental Methods -- Comparative Strengths and Performance of Algorithms -- Key Length -- Cryptographic Objectives -- Diffusion -- Confusion -- Obfuscation -- Perfect Forward Secrecy -- Security Through Obscurity -- Historical Perspectives -- Algorithms -- Substitution Ciphers -- One-Time Pads -- Key Management -- Random Numbers -- Salting -- Hashing Functions -- Message Digest -- SHA -- RIPEMD -- Hashing Summary -- Symmetric Encryption -- DES -- 3DES -- AES -- CAST -- RC -- Blowfish -- Twofish -- IDEA -- ChaCha20 -- Cipher Modes -- Authenticated Encryption with Associated Data (AEAD) -- Block vs. …”
    Libro electrónico
  10. 5930
    Publicado 2011
    Tabla de Contenidos: “…Privacy Laws -- European Laws -- Ethics -- SANS Institute IT Code of Ethics -- Chapter Review -- Questions -- Answers -- Part II Cryptography and Applications -- Chapter 4 Cryptography -- Algorithms -- Hashing -- SHA -- RIPEMD -- Message Digest -- Hashing Summary -- Symmetric Encryption -- DES -- 3DES -- AES -- CAST -- RC -- Blowfish -- Twofish -- IDEA -- Symmetric Encryption Summary -- Asymmetric Encryption -- RSA -- Diffie-Hellman -- ElGamal -- ECC -- Asymmetric Encryption Summary -- Quantum Cryptography -- Steganography -- Cryptography Algorithm Use -- Confidentiality -- Integrity -- Nonrepudiation -- Authentication -- Digital Signatures -- Key Escrow -- Transport Encryption -- Cryptographic Applications -- Chapter Review -- Questions -- Answers -- Chapter 5 Public Key Infrastructure -- The Basics of Public Key Infrastructures -- Certificate Authorities -- Registration Authorities -- Local Registration Authorities…”
    Libro electrónico
  11. 5931
    Publicado 2017
    Tabla de Contenidos: “…Best practices to follow -- Conclusion -- Single sign-on -- Idea solution -- Advantages of an SSO solution -- Challenges in the classic method of authentication -- Security Assertion Markup Language -- The high-level overview of working -- Choosing the right identity provider -- Building an SSO from scratch -- Hosted Based Intrusion Detection System -- Exploring OSSEC -- File integrity monitoring -- Log monitoring and active response -- Conclusion -- The hardened image approach -- Implementing hardening standards in scalable environments -- Important to remember -- Conclusion -- Summary -- Chapter 5: Cryptography Network Security -- Introduction to cryptography -- Integrity -- Authenticity -- Real world scenario -- Non-repudiation -- Types of cryptography -- Symmetric key cryptography -- Stream cipher -- The encryption process -- The decryption process -- Advantages of stream ciphers -- Block cipher (AES) -- Padding -- Modes of block ciphers -- Message authentication codes -- The MAC approach -- The challenges with symmetric key storage -- Hardware security modules -- The challenges with HSM in on-premise -- A real-world scenario -- HSM on the cloud -- CloudHSM -- Key management service -- The basic working of AWS KMS -- Encrypting a function in KMS -- Decrypting a function in KMS -- Implementation -- Practical guide -- Configuring AWS CLI -- The decryption function -- Envelope encryption -- The encryption process -- The decryption process -- Implementation steps -- Practical implementation of envelope encryption -- Credential management system with KMS -- Implementation -- Best practices in key management -- Rotation life cycle for encryption keys -- Scenario 1-a single key for all data encryption -- Scenario 2-multiple keys for data encryption -- Protecting the access keys -- Audit trail is important -- Asymmetric key encryption…”
    Libro electrónico
  12. 5932
    por Taylor, Paul G.
    Publicado 2015
    Texto completo en Odilo
    Otros
  13. 5933
  14. 5934
  15. 5935
    Libro
  16. 5936
  17. 5937
  18. 5938
    Publicado 2022
    Tabla de Contenidos: “…Where the Symmetric Key Is Just Protected by a Password -- Working with and Indexing Encrypted Columns -- Migrating or Restoring a Database with Column Encryption -- Temporary Keys -- Encryption by Passphrase -- Protection of Key Passwords Being Sent to SQL Server -- Summary -- Appendix A: Glossary of Terms -- A -- Advanced Encryption Standard -- AES -- Always Encrypted -- Always Encrypted Wizard -- Asymmetric Encryption -- Asymmetric Key -- At-Rest Data -- Attestation -- Authenticator -- Automated Key Management -- Azure Key Vault -- B -- Backup Encryption -- C -- CA -- CEK -- Certificate -- Certification Authority -- Certificate Store -- CMK -- Code Integrity Policy -- Column Encryption Key -- Column Master Key -- D -- Data Encryption Standard -- Database Encryption Key -- Database Master Key -- DEK -- DES -- Deterministic Encryption -- Diffie Hellman -- DMA Protection -- DMK -- DPAPI -- E -- EKM -- Enclave -- Encryption Scan -- Extensible Key Management -- H -- Hardware Security Module -- Hash -- HGS -- Host Guardian Service -- Host Health Certificate -- Host Key -- HSM -- I -- In-Transit Encryption -- K -- Key Rotation -- P -- Parameterization for Always Encrypted -- Private Key -- Public Key -- R -- Randomized Encryption -- S -- Salt -- Secure Boot -- Secure Hashing Algorithm -- Service Master Key -- SHA -- SMK -- Symmetric Encryption -- Symmetric Key -- T -- TDE -- TDS -- Temporary Key -- Thumbprint -- TLS -- TPM -- TPM Baseline -- TPM Endorsement Key -- Transport Layer Security -- Transparent Data Encryption -- Trusted Platform Module -- V -- VBS -- Virtualization Based Security -- W -- Windows Data Protection API -- Appendix B: Encryption in the Cloud -- Azure VM -- Azure SQL Database or Managed Instance -- TDE -- Backup Encryption -- Always Encrypted with Secure Enclaves -- TLS -- AWS VM (EC2) -- EKM -- Always Encrypted with Secure Enclaves…”
    Libro electrónico
  19. 5939
    Publicado 2023
    Tabla de Contenidos: “…Cryptographic negotiation -- ClientHello -- ServerHello -- HelloRetryRequest -- Summary -- Chapter 13: TLS Handshake Protocol Revisited -- TLS client state machine -- TLS server state machine -- Finished message -- Early data -- Post-handshake messages -- The NewSessionTicket message -- Post-handshake authentication -- Key and initialization vector update -- OpenSSL s_client -- Installing OpenSSL -- Using openssl-s_client -- TLS experiments with openssl-s_client -- Summary -- Part 3: Off the Record -- Chapter 14: Block Ciphers and Their Modes of Operation -- The big picture -- General principles -- Advantages and disadvantages of block ciphers -- Confusion and diffusion -- Pseudorandom functions -- Pseudorandom permutations -- Substitution-permutation networks and Feistel networks -- Constants in cryptographic algorithms -- DES S-boxes -- Nothing-up-my-sleeves numbers -- The AES block cipher -- Overall structure -- Round function -- Key scheduling -- Modes of operation -- ECB mode -- CBC mode -- CBC-MAC -- OFB mode -- CTR mode -- XTS mode -- Block ciphers in TLS 1.3 -- Summary -- Chapter 15: Authenticated Encryption -- Preliminaries -- Indistinguishability under a chosen-plaintext attack -- Indistinguishability under a chosen-ciphertext attack -- Non-malleability under a chosen-plaintext attack -- Plaintext integrity -- Ciphertext integrity -- Authenticated encryption - generic composition -- Encrypt-and-MAC -- MAC-then-encrypt -- Encrypt-then-MAC -- Security of generic composition -- Authenticated ciphers -- Authenticated encryption with associated data -- Avoiding predictability with nonces -- Counter with cipher block chaining message authentication code (CCM) -- Authenticated encryption with CCM -- Authenticated decryption with CCM -- AEAD in TLS 1.3 -- Summary -- Chapter 16: The Galois Counter Mode -- Preliminaries -- The Galois field F2128…”
    Libro electrónico
  20. 5940
    Publicado 2022
    Tabla de Contenidos: “…Encoding using Huffman compression -- Remembering sequences with LZW -- Hiding Your Secrets with Cryptography -- Substituting characters -- Working with AES encryption -- Part 5 Challenging Difficult Problems -- Chapter 15 Working with Greedy Algorithms -- Deciding When It Is Better to Be Greedy -- Understanding why greedy is good -- Keeping greedy algorithms under control -- Considering NP complete problems -- Finding Out How Greedy Can Be Useful -- Arranging cached computer data -- Competing for resources -- Revisiting Huffman coding -- Chapter 16 Relying on Dynamic Programming -- Explaining Dynamic Programming -- Obtaining a historical basis -- Making problems dynamic -- Casting recursion dynamically -- Leveraging memoization -- Discovering the Best Dynamic Recipes -- Looking inside the knapsack -- Touring around cities -- Approximating string search -- Chapter 17 Using Randomized Algorithms -- Defining How Randomization Works -- Considering why randomization is needed -- Understanding how probability works -- Understanding distributions -- Simulating the use of the Monte Carlo method -- Putting Randomness into your Logic -- Calculating a median using quick select -- Doing simulations using Monte Carlo -- Ordering faster with quick sort -- Chapter 18 Performing Local Search -- Understanding Local Search -- Knowing the neighborhood -- Presenting local search tricks -- Explaining hill climbing with n-queens -- Discovering simulated annealing -- Avoiding repeats using Tabu Search -- Solving Satisfiability of Boolean Circuits -- Solving 2-SAT using randomization -- Implementing the Python code -- Realizing that the starting point is important -- Chapter 19 Employing Linear Programming -- Using Linear Functions as a Tool -- Grasping the basic math you need -- Learning to simplify when planning -- Working with geometry using simplex…”
    Libro electrónico