Mostrando 121 - 133 Resultados de 133 Para Buscar '"PGP"', tiempo de consulta: 0.09s Limitar resultados
  1. 121
    Publicado 2022
    Tabla de Contenidos: “…Algorithm Selection -- Common Use Cases -- HMAC -- S/MIME -- IETF S/MIME History -- IETF S/MIME v3 Specifications -- PGP -- How PGP Works -- Steganography -- Secure Protocols -- DNSSEC -- SSH -- S/MIME -- SRTP -- LDAPS -- FTPS -- SFTP -- SNMPv3 -- TLS -- HTTPS -- Secure POP/IMAP -- IPSec -- Secure Protocol Use Cases -- Voice and Video -- Time Synchronization -- E-mail and Web -- File Transfer -- Directory Services…”
    Libro electrónico
  2. 122
    Publicado 2017
    Tabla de Contenidos: “…-- Warnings When Using the TOR Network -- Virtual Private Networks -- SSH Tunneling -- Using Proxy Server -- Web Proxy Types -- Security Risks Associated With Proxy Servers -- Anonymous Search Engine -- StartPage -- DUCKDUCKGO -- DISCONNECT SEARCH -- Web Browser Privacy Add-Ons -- Check Browser Fingerprint -- BrowserLeaks.com (https://www.browserleaks.com) -- Panopticlick (https://panopticlick.eff.org) -- Mozilla Firefox Privacy Add-Ons -- HTTPS Everywhere -- Disconnect -- Privacy Badger -- Self-Destructing Cookies -- uBlock Origin -- Random Agent Spoofer -- Secure Anonymous File Sharing -- OnionShare -- ENCRYPTING EMAIL COMMUNICATIONS -- Email Encryption Using Gpg4Win -- Public and Private Key Concept in Encryption -- What Is a Digital Signature Concept? -- Create PGP Keypair Certificate -- Prerequisites to Send and Receive Encrypted Emails Using Gpg4win -- Encrypting Emails in MS Outlook® Using the GpG4win Component (GpgOL) -- How to Decrypt an Encrypted Message Sent to You -- Making Sure You Are Talking With the Correct Person -- Open PGP Encryption for Webmail Using the Mailvelope Browser Extension -- Secure Web Mail Providers -- ProtonMail -- GhostMail -- ENCRYPT INSTANT MESSAGING, VIDEO CALLS, AND VOIP SESSIONS -- What Are the Risks? …”
    Libro electrónico
  3. 123
    por Barrett, Daniel J.
    Publicado 2005
    Tabla de Contenidos: “…1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts…”
    Libro electrónico
  4. 124
    Tabla de Contenidos: “….- PET-imaging of the Impact of Extracellular pH and MAP Kinases on the p-glycoprotein (Pgp) Activity.- Meconium and Transitional Stools May Cause Interference with Near-Infrared Spectroscopy Measurements of Intestinal Oxygen Saturation in Preterm Infants.- Acute Effects of Physical Exercise on Prefrontal Cortex Activity in Older Adults: A Functional Near-Infrared Spectroscopy Study.- Blood Flow and Oxygenation Status of Prostate Cancers.- Targeted Delivery of VEGF to Treat Myocardial Infarction.- Magnetic Nanoparticles and Thermally-Responsive Polymer for Targeted Hyperthermia and Sustained Anti-Cancer Drug Delivery.- NIR Fluorophore-Hollow Gold Nanosphere Complex for Cancer Enzyme Triggered Detection and Hyperthermia -- Renal Oxygenation and Function of the Rat Kidney: Effects of Inspired Oxygen and Preglomerular Oxygen Shunting.- Alteration of the Inflammatory Molecule Network after Irradiation of Soft Tissue.- Imaging the Redox States of Human Breast Cancer Core Biopsies.- Early Life Hypoxic or Hypoxic/hypercapnic Stress Alters Acute Ventilatory Sensitivity in Adult Mice.- 3D Analysis of Intracortical Microvasculature during Chronic Hypoxia in Mouse Brain.- Contribution of Brain Glucose and Ketone Bodies to Oxidative Metabolism -- Alteration of Circulating Mitochondrial DNA Concentration after Irradiation…”
    Libro electrónico
  5. 125
    Publicado 2017
    Tabla de Contenidos: “…-- 2:2 Build your own birdfeeder. -- 2:3 A PGP Matryoshka Doll -- 2:4 Code Execution on a Tamagotchi -- 2:5 Shellcode for MSP430 -- 2:6 Calling putchar() from ELF -- 2:7 POKE of Death for the TRS 80/M100 -- 2:8 This OS is also a PDF -- 2:9 A Vulnerability in Reduced Dakarand -- 2:10 Juggernauty -- Chapter 3: Address on the Smashing of Idols to Bits and Bytes -- 3:1 Fear Not! …”
    Libro electrónico
  6. 126
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: A Brief History and Outline of Cryptography -- Chapter 1: Deep Dive into Cryptography -- An introduction to cryptography -- Binary numbers, ASCII code, and notations -- Fermat's Last Theorem, prime numbers, and modular mathematics -- A brief history and a panoramic overview of cryptographic algorithms -- Rosetta Stone -- The Caesar cipher -- ROT13 -- The Beale ciphers -- The Vernam cipher -- Notes on security and computation -- Summary -- Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption) -- Chapter 2: Symmetric Encryption Algorithms -- Notations and operations in Boolean logic -- DES algorithms -- Simple DES -- Bit initialization -- Bit expansion -- Key generation -- Bit encryption -- DES -- Key generation in DES -- Analysis of the DES algorithm -- Violation of DES -- Triple DES -- DESX -- AES Rijndael -- Description of AES -- Attacks and vulnerabilities in AES -- Summary -- Chapter 3: Asymmetric Encryption Algorithms -- Introduction to asymmetric encryption -- The pioneers -- The Diffie-Hellman algorithm -- The discrete logarithm -- Explaining the D-H algorithm -- Analyzing the algorithm -- Possible attacks and cryptanalysis on the D-H algorithm -- RSA -- Explaining RSA -- Analyzing RSA -- Conventional attacks on the algorithm -- The application of RSA to verify international treaties -- Unconventional attacks -- PGP -- The ElGamal algorithm -- Summary -- Chapter 4: Hash Functions and Digital Signatures -- A basic explanation of hash functions -- Overview of the main hash algorithms -- Logic and notations to implement hash functions -- Explanation of the SHA-1 algorithm -- Notes and example on SHA-1 -- Example of one block encoded with SHA- 1 -- Authentication and digital signatures -- RSA digital signatures -- Why do digital signatures work?…”
    Libro electrónico
  7. 127
    Publicado 2021
    Tabla de Contenidos: “…Wireshark -- Berkeley Packet Filter -- Port Mirroring/Spanning -- Packet Analysis -- Spoofing Attacks -- ARP Spoofing -- DNS Spoofing -- sslstrip -- Spoofing Detection -- Summary -- Review Questions -- Chapter 10 Social Engineering -- Social Engineering -- Pretexting -- Social Engineering Vectors -- Physical Social Engineering -- Badge Access -- Man Traps -- Biometrics -- Phone Calls -- Baiting -- Phishing Attacks -- Website Attacks -- Cloning -- Rogue Attacks -- Wireless Social Engineering -- Automating Social Engineering -- Summary -- Review Questions -- Chapter 11 Wireless Security -- Wi-Fi -- Wi-Fi Network Types -- Wi-Fi Authentication -- Wi-Fi Encryption -- Bring Your Own Device -- Wi-Fi Attacks -- Bluetooth -- Scanning -- Bluejacking -- Bluesnarfing -- Bluebugging -- Mobile Devices -- Mobile Device Attacks -- Summary -- Review Questions -- Chapter 12 Attack and Defense -- Web Application Attacks -- XML External Entity Processing -- Cross-Site Scripting -- SQL Injection -- Command Injection -- File Traversal -- Web Application Protections -- Denial-of-Service Attacks -- Bandwidth Attacks -- Slow Attacks -- Legacy -- Application Exploitation -- Buffer Overflow -- Heap Spraying -- Application Protections and Evasions -- Lateral Movement -- Defense in Depth/Defense in Breadth -- Defensible Network Architecture -- Summary -- Review Questions -- Chapter 13 Cryptography -- Basic Encryption -- Substitution Ciphers -- Diffie-Hellman -- Symmetric Key Cryptography -- Data Encryption Standard -- Advanced Encryption Standard -- Asymmetric Key Cryptography -- Hybrid Cryptosystem -- Nonrepudiation -- Elliptic Curve Cryptography -- Certificate Authorities and Key Management -- Certificate Authority -- Trusted Third Party -- Self-Signed Certificates -- Cryptographic Hashing -- PGP and S/MIME -- Disk and File Encryption -- Summary -- Review Questions…”
    Libro electrónico
  8. 128
    Publicado 2016
    Tabla de Contenidos: “…Identify the Subject Drive -- Query the Subject Disk for Information -- Document Device Identification Details -- Query Disk Capabilities and Features with hdparm -- Extract SMART Data with smartctl -- Enable Access to Hidden Sectors -- Remove a DCO -- Remove an HPA -- Drive Service Area Access -- ATA Password Security and Self-Encrypting Drives -- Identify and Unlock ATA Password-Protected Disks -- Identify and Unlock Opal Self-Encrypting Drives -- Encrypted Flash Thumb Drives -- Attach Removable Media -- Optical Media Drives -- Magnetic Tape Drives -- Memory Cards -- Attach Other Storage -- Apple Target Disk Mode -- NVME SSDs -- Other Devices with Block or Character Access -- Closing Thoughts -- Chapter 6: Forensic Image Acquisition -- Acquire an Image with dd Tools -- Standard Unix dd and GNU dd -- The dcfldd and dc3dd Tools -- Acquire an Image with Forensic Formats -- The ewfacquire Tool -- AccessData ftkimager -- SquashFS Forensic Evidence Container -- Acquire an Image to Multiple Destinations -- Preserve Digital Evidence with Cryptography -- Basic Cryptographic Hashing -- Hash Windows -- Sign an Image with PGP or S/MIME -- RFC-3161 Timestamping -- Manage Drive Failure and Errors -- Forensic Tool Error Handling -- Data Recovery Tools -- SMART and Kernel Errors -- Other Options for Failed Drives -- Damaged Optical Discs -- Image Acquisition over a Network -- Remote Forensic Imaging with rdd -- Secure Remote Imaging with ssh -- Remote Acquisition to a SquashFS Evidence Container -- Acquire a Remote Disk to EnCase or FTK Format -- Live Imaging with Copy-On-Write Snapshots -- Acquire Removable Media -- Memory Cards -- Optical Discs -- Magnetic Tapes -- RAID and Multidisk Systems -- Proprietary RAID Acquisition -- JBOD and RAID-0 Striped Disks -- Microsoft Dynamic Disks -- RAID-1 Mirrored Disks -- Linux RAID-5 -- Closing Thoughts…”
    Libro electrónico
  9. 129
    Publicado 2009
    Tabla de Contenidos: “…Multiresistencia inducida por la Pglicoproteína (PGP) producto del gen MDR1 --4. Proteína asociada a la multiresistencia (MRP) --5. …”
    Enlace del recurso
    Electrónico
  10. 130
    Publicado 2022
    Tabla de Contenidos: “…-- 8.2 Principles of Cryptography -- 8.2.1 Symmetric Key Cryptography -- 8.2.2 Public Key Encryption -- 8.3 Message Integrity and Digital Signatures -- 8.3.1 Cryptographic Hash Functions -- 8.3.2 Message Authentication Code -- 8.3.3 Digital Signatures -- 8.4 End-Point Authentication -- 8.5 Securing E-Mail -- 8.5.1 Secure E-Mail -- 8.5.2 PGP -- 8.6 Securing TCP Connections: TLS -- 8.6.1 The Big Picture -- 8.6.2 A More Complete Picture -- 8.7 Network-Layer Security: IPsec and Virtual Private Networks -- 8.7.1 IPsec and Virtual Private Networks (VPNs) -- 8.7.2 The AH and ESP Protocols -- 8.7.3 Security Associations -- 8.7.4 The IPsec Datagram -- 8.7.5 IKE: Key Management in IPsec -- 8.8 Securing Wireless LANs and 4G/5G Cellular Networks -- 8.8.1 Authentication and Key Agreement in 802.11 Wireless LANs…”
    Libro electrónico
  11. 131
    por Conallen, Jim
    Publicado 1999
    “…Key topics include: A basic introduction to web servers, browsers, HTTP, and HTML Gathering requirements and defining the system's use cases Transforming requirements into a model and then a design that maps directly into components of the system Defining the architecture of a web application with an examination of three architectural patterns describing architectures for thin web client, thick web client, and web delivery designs Modeling, at the appropriate level of abstraction and detail, the appropriate artifacts, including web application pages, page relationships, navigate routes, client-side scripts, and server-side generation Creating code from UML models using ASP and VBScript Client-side scripting using DHTML, Java Script, VBScript, Applets, ActiveX controls, and DOM Using client/server protocols including DCOM, CORBA/IIOP, and Java's RMI Securing a web application with SET, SSL, PGP, Certificates, and Certificate Authorities 0201615770B04062001…”
    Libro electrónico
  12. 132
    Publicado 2002
    “…Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. …”
    Libro electrónico
  13. 133
    Publicado 2015
    “…The reasons explaining the increased efficacy of liposomal/nanoparticle-based drugs in Pgp-overexpressing tumors include the coating with specific surfactants, the composition changes in the plasma membrane microdomains where P-gp is embedded, the direct impairment of P-gp catalytic mechanisms exerted by specific component of the liposomal shell, but are not yet fully understood. …”
    Libro electrónico