Mostrando 101 - 120 Resultados de 133 Para Buscar '"PGP"', tiempo de consulta: 0.06s Limitar resultados
  1. 101
    Publicado 2009
    “…Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from: Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. …”
    Libro electrónico
  2. 102
    por Teodoreto de Ciro
    Publicado 1860
    Libro
  3. 103
  4. 104
    Libro
  5. 105
  6. 106
  7. 107
    por Maillo Fernández, Juan Andrés
    Publicado 2017
    Tabla de Contenidos: “…SISTEMAS SEGUROS DE ACCESO Y TRANSMISIÓN DE DATOS -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- CAPÍTULO 1 -- 1.1 INTRODUCCIÓN A LA SEGURIDAD -- 1.2 PRINCIPIOS DE LA SEGURIDAD -- 1.3 EN BUSCA DE LA SEGURIDAD -- CAPÍTULO 2 -- 2.1 INTRODUCCIÓN -- 2.2 PERSPECTIVA -- 2.3 FUNDAMENTOS TEÓRICOS -- CAPÍTULO 3 -- 3.1 TIPOS DE MÉTODOS -- 3.2 PRINCIPALES ALGORITMOS -- 3.3 ATAQUES CRIPTO ANALÍTICOS SOBRE MÉTODOS -- CAPÍTULO 4 -- 4.1 CRIPTOSISTEMAS -- 4.2 CIFRADO EN FLUJO -- 4.3 CIFRA SIMÉTRICA -- 4.4 CIFRA ASIMÉTRICA -- 4.5 CIFRADO SIMÉTRICO VS CIFRADO ASIMÉTRICO -- 4.6 EL FUTURO DE LA CRIPTOGRAGÍA -- CAPÍTULO 5 -- 5.1 AUTENTICACIÓN -- 5.2 FIRMA ELECTRÓNICA -- 5.3 FUNCIONES RESUMEN -- 5.4CERTIFICADOS -- 5.5 INFRAESTRUCTURA -- CAPÍTULO 6 -- 6.1¿POR QUÉ CORREO ELECTRÓNICO -- 6.2PGP -- 6.3 GPG -- 6.4 S/MIME -- CAPÍTULO 7 -- 7.1 INTRODUCCIÓN -- 7.2 REDES PRIVADAS -- 7.3 TÚNELES CIFRADOS -- 7.4 PROTOCOLOS DE TÚNEL -- 7.5 PROTOCOLOS SSL -- 7.6 SISTEMAS VPN -- 7.7 VENTAJAS E INCONVENIENTES -- CAPÍTULO 8 -- 8.1 NECESIDAD DE SEGURIDAD -- 8.2 PROTOCOLO WEP -- 8.3 PROTOCOLO WPA -- 8.4 PROTOCOLO -- REFERENCIAS…”
    Libro electrónico
  8. 108
  9. 109
  10. 110
    Publicado 2013
    Tabla de Contenidos: “…Criptografía; 1 >> Introducción a la criptografía; 1.1 > Definiciones; 1.2 > Elementos de un criptosistema; 1.3 > Tipos de sistemas de cifrado; 2 >> Cifrado de clave simétrica; 3 >> Cifrado de clave asimétrica; 3.1 > Autenticación con claves asimétricas; 3.2 > Confidencialidad con claves asimétricas; 3.3 > Algoritmos de cifrado; 4 >> Algoritmo de cifrado hash; 5 >> Sistemas híbridos; 5.1 > PGP (Pretty Good Privacy); 5.2 > OpenPGP…”
    Libro electrónico
  11. 111
    Publicado 2013
    Tabla de Contenidos: “…7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481.…”
    Libro electrónico
  12. 112
    por Beckner, Mark
    Publicado 2013
    Tabla de Contenidos: “…Title Page; Copyright Page; Dedication Page; Contents at a Glance; Table of Contents; Foreword; About the Author; About the Technical Reviewer; Introduction; Chapter 1 Architectural Patterns; Receiving Inbound 837P Data; Receiving Data via SFTP; Receiving PGP Encrypted Data via FTP; Receiving Data via AS2; Receiving Data Mapped to Other 837P Formats; Receiving Data Mapped to Proprietary Flat Files; Receiving Data Mapped to a SQL Server Database; Receiving Data that Requires an Acknowledgement; Receiving Data that Requires an Orchestration; Sending Outbound 837P Files…”
    Libro electrónico
  13. 113
    por Zdziarski, Jonathan A.
    Publicado 2008
    Tabla de Contenidos: “…Forensic Recovery; Creating an Ad-Hoc Network; Windows; SSH to the iPhone; Recovering the Media Partition; Windows; Tools Needed; MD5 Digests; Unencrypted Recovery; Windows; Sending the data; Encrypted Recovery of the Media Partition; Making Commercial Tools Compatible; Data Carving Using Foremost/Scalpel; Voicemail messages; Property lists; SQLite databases; Email; Web pages; Other files; PGP blocks; Images; Building Rules; Scanning with Foremost/Scalpel…”
    Libro electrónico
  14. 114
    por Beckner, Mark. author
    Publicado 2014
    Tabla de Contenidos: “…""Contents at a Glance""; ""Contents""; ""About the Author""; ""Introduction""; ""Chapter 1: Architectural Patterns""; ""The Health Care Claim 837 Format""; ""The Benefit Enrollment and Maintenance 834 Format""; ""Receiving Inbound Data""; ""Receiving Data via SFTP""; ""Receiving PGP Encrypted Data via FTP""; ""Receiving Data via AS2""; ""Receiving Data that is Mapped to Other Formats""; ""Receiving Data that is Mapped to Proprietary Flat Files""; ""Receiving Data that is Mapped to a SQL Server Database""; ""Receiving Data that Requires an Acknowledgement""…”
    Libro electrónico
  15. 115
    Tabla de Contenidos: “…Uso de herramientas de cifrado tipo PGP, GPG o CryptoLoop -- 16. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 2 Aplicación de una infraestructura de clave pública (PKI) -- 1. …”
    Libro electrónico
  16. 116
    por Garfinkel, Simson
    Publicado 2002
    Tabla de Contenidos: “…Digital Identification II: Digital Certificates, CAs, and PKI; Understanding Digital Certificates with PGP; Public Key Infrastructure; Open Policy Issues…”
    Libro electrónico
  17. 117
    por Cherry, Denny
    Publicado 2014
    Tabla de Contenidos: “…SSL versus the NSA; How can I stop people from watching what I do?; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary; Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?…”
    Libro electrónico
  18. 118
    por Institute of Medicine (U.S.).
    Publicado 1996
    Tabla de Contenidos: “…-- INTRODUCTION -- INVITED ADDRESS -- INVITED REACTION -- INVITED REACTION -- INVITED REACTION -- The Patient -- The Role of The Physician and the Relationship Between the Primary Care Provider and the Specialist -- Other Elements in An Ideal System of Care -- Rehabilitation -- Exercise -- Nonrestrictive Drug Formularies -- Alternative Delivery Mechanisms -- Structured Care -- Relationship Between Financing and Care -- Measurement of Outcomes in an Ideal Care System -- Access to an Ideal Care System -- Conclusion -- DISCUSSION -- 5 Managed Care and Rheumatoid Arthritis: Utilization and Outcomes Over 11 Years -- INTRODUCTION -- INVITED ADDRESS -- Literature on Health Care Utilization and Outcomes in FFS and HMOs -- Study Design -- Results -- Health Care Utilization -- Health Outcomes -- Summary of FFS-PGP Comparisons -- Comparisons of Care Provided by Rheumatologists and Nonrheumatologists -- Conclusions -- INVITED REACTION -- INVITED REACTION -- DISCUSSION -- 6 Measuring Medical Outcomes: Longitudinal Data on the Differential Impact of Health Care Systems on Chronic Disease -- INTRODUCTION -- INVITED ADDRESS -- INVITED REACTION -- INVITED REACTION -- DISCUSSION…”
    Libro electrónico
  19. 119
    Publicado 2011
    Tabla de Contenidos: “…Certificate Repositories -- Trust and Certificate Verification -- Digital Certificates -- Certificate Attributes -- Certificate Extensions -- Certificate Lifecycles -- Centralized or Decentralized Infrastructures -- Hardware Storage Devices -- Private Key Protection -- Key Recovery -- Key Escrow -- Public Certificate Authorities -- In-house Certificate Authorities -- Outsourced Certificate Authorities -- Tying Different PKIs Together -- Trust Models -- Chapter Review -- Questions -- Answers -- Chapter 6 Standards and Protocols -- PKIX/PKCS -- PKIX Standards -- PKCS -- Why You Need to Know the PKIX and PKCS Standards -- X. 509 -- SSL/TLS -- ISAKMP -- CMP -- XKMS -- S/MIME -- IETF S/MIME v3 Specifications -- PGP -- How PGP Works -- HTTPS -- IPsec -- CEP -- FIPS -- Common Criteria (CC) -- WTLS -- PPTP -- WEP -- WEP Security Issues -- ISO/IEC 27002 (Formerly ISO 17799) -- Chapter Review -- Questions -- Answers -- Part III Security in the Infrastructure -- Chapter 7 Physical Security -- The Security Problem -- Physical Security Safeguards -- Walls and Guards -- Policies and Procedures -- Access Controls and Monitoring -- Environmental Controls -- Fire Suppression -- Authentication -- Chapter Review -- Questions -- Answers -- Chapter 8 Infrastructure Security -- Devices -- Workstations -- Servers -- Network Interface Cards -- Hubs -- Bridges -- Switches -- Routers -- Firewalls -- Wireless -- Modems -- Telecom/PBX -- RAS -- VPN -- Intrusion Detection Systems -- Network Access Control -- Network Monitoring/Diagnostic -- Virtualization -- Mobile Devices -- Media -- Coaxial Cable -- UTP/STP -- Fiber -- Unguided Media -- Security Concerns for Transmission Media -- Physical Security -- Removable Media -- Magnetic Media -- Optical Media -- Electronic Media -- The Cloud -- Software as a Service -- Platform as a Service -- Infrastructure as a Service…”
    Libro electrónico
  20. 120
    por Knudsen, Jonathan
    Publicado 1998
    Tabla de Contenidos: “…ModesECB; CBC; PCBC; CFB; OFB; Other modes; Algorithms; javax.crypto.Cipher; Getting a Cipher; Basic Information; Initializing a Cipher; Generic; Name brand; Feeding Data to a Cipher; Cipher's Close Relatives; Cipher Streams; javax.crypto.SealedObject; Passphrase Encryption; Salt and Vinegar; Test Drive; Inside Cipher; SPI; Setup; Basic information; Initializing; Feeding; BlockCipher; CBCWrapper; CFBWrapper; Hybrid Systems; PGP; S/MIME; SSL; Sources; Using the browser; SET; Chapter 8. …”
    Libro electrónico