Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Colecciones 89
- Patrística 89
- Patrística griega 88
- Literatura cristiana primitiva 84
- Juan Crisóstomo 13
- Security measures 9
- Computer networks 7
- Cirilo de Jerusalén 6
- Computer security 6
- Eusebio 5
- Literatura latino-cristiana 4
- Orígenes 4
- Atanasio 3
- Certification 3
- Data encryption (Computer science) 3
- Electronic data processing personnel 3
- Examinations 3
- Photius 3
- Teodoreto de Ciro 3
- Basilio 2
- Computers 2
- Cryptography 2
- Data recovery (Computer science) 2
- Development 2
- Electronic mail systems 2
- Engineering & Applied Sciences 2
- Euthymius Zigabenus 2
- Gregorio Nacianceno 2
- Gregorio de Nisa 2
- Historia 2
-
101Publicado 2009“…Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from: Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. …”
Libro electrónico -
102
-
103
-
104
-
105
-
106
-
107por Maillo Fernández, Juan AndrésTabla de Contenidos: “…SISTEMAS SEGUROS DE ACCESO Y TRANSMISIÓN DE DATOS -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- CAPÍTULO 1 -- 1.1 INTRODUCCIÓN A LA SEGURIDAD -- 1.2 PRINCIPIOS DE LA SEGURIDAD -- 1.3 EN BUSCA DE LA SEGURIDAD -- CAPÍTULO 2 -- 2.1 INTRODUCCIÓN -- 2.2 PERSPECTIVA -- 2.3 FUNDAMENTOS TEÓRICOS -- CAPÍTULO 3 -- 3.1 TIPOS DE MÉTODOS -- 3.2 PRINCIPALES ALGORITMOS -- 3.3 ATAQUES CRIPTO ANALÍTICOS SOBRE MÉTODOS -- CAPÍTULO 4 -- 4.1 CRIPTOSISTEMAS -- 4.2 CIFRADO EN FLUJO -- 4.3 CIFRA SIMÉTRICA -- 4.4 CIFRA ASIMÉTRICA -- 4.5 CIFRADO SIMÉTRICO VS CIFRADO ASIMÉTRICO -- 4.6 EL FUTURO DE LA CRIPTOGRAGÍA -- CAPÍTULO 5 -- 5.1 AUTENTICACIÓN -- 5.2 FIRMA ELECTRÓNICA -- 5.3 FUNCIONES RESUMEN -- 5.4CERTIFICADOS -- 5.5 INFRAESTRUCTURA -- CAPÍTULO 6 -- 6.1¿POR QUÉ CORREO ELECTRÓNICO -- 6.2PGP -- 6.3 GPG -- 6.4 S/MIME -- CAPÍTULO 7 -- 7.1 INTRODUCCIÓN -- 7.2 REDES PRIVADAS -- 7.3 TÚNELES CIFRADOS -- 7.4 PROTOCOLOS DE TÚNEL -- 7.5 PROTOCOLOS SSL -- 7.6 SISTEMAS VPN -- 7.7 VENTAJAS E INCONVENIENTES -- CAPÍTULO 8 -- 8.1 NECESIDAD DE SEGURIDAD -- 8.2 PROTOCOLO WEP -- 8.3 PROTOCOLO WPA -- 8.4 PROTOCOLO -- REFERENCIAS…”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
108
-
109
-
110Publicado 2013Tabla de Contenidos: “…Criptografía; 1 >> Introducción a la criptografía; 1.1 > Definiciones; 1.2 > Elementos de un criptosistema; 1.3 > Tipos de sistemas de cifrado; 2 >> Cifrado de clave simétrica; 3 >> Cifrado de clave asimétrica; 3.1 > Autenticación con claves asimétricas; 3.2 > Confidencialidad con claves asimétricas; 3.3 > Algoritmos de cifrado; 4 >> Algoritmo de cifrado hash; 5 >> Sistemas híbridos; 5.1 > PGP (Pretty Good Privacy); 5.2 > OpenPGP…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
111Publicado 2013Tabla de Contenidos: “…7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481.…”
Libro electrónico -
112por Beckner, MarkTabla de Contenidos: “…Title Page; Copyright Page; Dedication Page; Contents at a Glance; Table of Contents; Foreword; About the Author; About the Technical Reviewer; Introduction; Chapter 1 Architectural Patterns; Receiving Inbound 837P Data; Receiving Data via SFTP; Receiving PGP Encrypted Data via FTP; Receiving Data via AS2; Receiving Data Mapped to Other 837P Formats; Receiving Data Mapped to Proprietary Flat Files; Receiving Data Mapped to a SQL Server Database; Receiving Data that Requires an Acknowledgement; Receiving Data that Requires an Orchestration; Sending Outbound 837P Files…”
Publicado 2013
Libro electrónico -
113por Zdziarski, Jonathan A.Tabla de Contenidos: “…Forensic Recovery; Creating an Ad-Hoc Network; Windows; SSH to the iPhone; Recovering the Media Partition; Windows; Tools Needed; MD5 Digests; Unencrypted Recovery; Windows; Sending the data; Encrypted Recovery of the Media Partition; Making Commercial Tools Compatible; Data Carving Using Foremost/Scalpel; Voicemail messages; Property lists; SQLite databases; Email; Web pages; Other files; PGP blocks; Images; Building Rules; Scanning with Foremost/Scalpel…”
Publicado 2008
Libro electrónico -
114por Beckner, Mark. authorTabla de Contenidos: “…""Contents at a Glance""; ""Contents""; ""About the Author""; ""Introduction""; ""Chapter 1: Architectural Patterns""; ""The Health Care Claim 837 Format""; ""The Benefit Enrollment and Maintenance 834 Format""; ""Receiving Inbound Data""; ""Receiving Data via SFTP""; ""Receiving PGP Encrypted Data via FTP""; ""Receiving Data via AS2""; ""Receiving Data that is Mapped to Other Formats""; ""Receiving Data that is Mapped to Proprietary Flat Files""; ""Receiving Data that is Mapped to a SQL Server Database""; ""Receiving Data that Requires an Acknowledgement""…”
Publicado 2014
Libro electrónico -
115por De Fuentes García-Romero de Tejada, José MaríaTabla de Contenidos: “…Uso de herramientas de cifrado tipo PGP, GPG o CryptoLoop -- 16. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 2 Aplicación de una infraestructura de clave pública (PKI) -- 1. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
116por Garfinkel, SimsonTabla de Contenidos: “…Digital Identification II: Digital Certificates, CAs, and PKI; Understanding Digital Certificates with PGP; Public Key Infrastructure; Open Policy Issues…”
Publicado 2002
Libro electrónico -
117por Cherry, DennyTabla de Contenidos: “…SSL versus the NSA; How can I stop people from watching what I do?; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary; Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?…”
Publicado 2014
Libro electrónico -
118por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- INTRODUCTION -- INVITED ADDRESS -- INVITED REACTION -- INVITED REACTION -- INVITED REACTION -- The Patient -- The Role of The Physician and the Relationship Between the Primary Care Provider and the Specialist -- Other Elements in An Ideal System of Care -- Rehabilitation -- Exercise -- Nonrestrictive Drug Formularies -- Alternative Delivery Mechanisms -- Structured Care -- Relationship Between Financing and Care -- Measurement of Outcomes in an Ideal Care System -- Access to an Ideal Care System -- Conclusion -- DISCUSSION -- 5 Managed Care and Rheumatoid Arthritis: Utilization and Outcomes Over 11 Years -- INTRODUCTION -- INVITED ADDRESS -- Literature on Health Care Utilization and Outcomes in FFS and HMOs -- Study Design -- Results -- Health Care Utilization -- Health Outcomes -- Summary of FFS-PGP Comparisons -- Comparisons of Care Provided by Rheumatologists and Nonrheumatologists -- Conclusions -- INVITED REACTION -- INVITED REACTION -- DISCUSSION -- 6 Measuring Medical Outcomes: Longitudinal Data on the Differential Impact of Health Care Systems on Chronic Disease -- INTRODUCTION -- INVITED ADDRESS -- INVITED REACTION -- INVITED REACTION -- DISCUSSION…”
Publicado 1996
Libro electrónico -
119Publicado 2011Tabla de Contenidos: “…Certificate Repositories -- Trust and Certificate Verification -- Digital Certificates -- Certificate Attributes -- Certificate Extensions -- Certificate Lifecycles -- Centralized or Decentralized Infrastructures -- Hardware Storage Devices -- Private Key Protection -- Key Recovery -- Key Escrow -- Public Certificate Authorities -- In-house Certificate Authorities -- Outsourced Certificate Authorities -- Tying Different PKIs Together -- Trust Models -- Chapter Review -- Questions -- Answers -- Chapter 6 Standards and Protocols -- PKIX/PKCS -- PKIX Standards -- PKCS -- Why You Need to Know the PKIX and PKCS Standards -- X. 509 -- SSL/TLS -- ISAKMP -- CMP -- XKMS -- S/MIME -- IETF S/MIME v3 Specifications -- PGP -- How PGP Works -- HTTPS -- IPsec -- CEP -- FIPS -- Common Criteria (CC) -- WTLS -- PPTP -- WEP -- WEP Security Issues -- ISO/IEC 27002 (Formerly ISO 17799) -- Chapter Review -- Questions -- Answers -- Part III Security in the Infrastructure -- Chapter 7 Physical Security -- The Security Problem -- Physical Security Safeguards -- Walls and Guards -- Policies and Procedures -- Access Controls and Monitoring -- Environmental Controls -- Fire Suppression -- Authentication -- Chapter Review -- Questions -- Answers -- Chapter 8 Infrastructure Security -- Devices -- Workstations -- Servers -- Network Interface Cards -- Hubs -- Bridges -- Switches -- Routers -- Firewalls -- Wireless -- Modems -- Telecom/PBX -- RAS -- VPN -- Intrusion Detection Systems -- Network Access Control -- Network Monitoring/Diagnostic -- Virtualization -- Mobile Devices -- Media -- Coaxial Cable -- UTP/STP -- Fiber -- Unguided Media -- Security Concerns for Transmission Media -- Physical Security -- Removable Media -- Magnetic Media -- Optical Media -- Electronic Media -- The Cloud -- Software as a Service -- Platform as a Service -- Infrastructure as a Service…”
Libro electrónico -
120por Knudsen, JonathanTabla de Contenidos: “…ModesECB; CBC; PCBC; CFB; OFB; Other modes; Algorithms; javax.crypto.Cipher; Getting a Cipher; Basic Information; Initializing a Cipher; Generic; Name brand; Feeding Data to a Cipher; Cipher's Close Relatives; Cipher Streams; javax.crypto.SealedObject; Passphrase Encryption; Salt and Vinegar; Test Drive; Inside Cipher; SPI; Setup; Basic information; Initializing; Feeding; BlockCipher; CBCWrapper; CFBWrapper; Hybrid Systems; PGP; S/MIME; SSL; Sources; Using the browser; SET; Chapter 8. …”
Publicado 1998
Libro electrónico