Mostrando 7,441 - 7,460 Resultados de 8,979 Para Buscar 'Ciper~', tiempo de consulta: 1.05s Limitar resultados
  1. 7441
    por Friedenthal, Richard, 1896-1979
    Publicado 1981
    Libro
  2. 7442
    por Dahrendorf, Ralf, 1929-2009
    Publicado 1965
    Libro
  3. 7443
    por Eibl-Eibesfeldt, Irenäus
    Publicado 1994
    Libro
  4. 7444
    por Dahrendorf, Ralf, 1929-2009
    Publicado 1975
    Libro
  5. 7445
    por Hermann, Armin, 1933-
    Publicado 1994
    Libro
  6. 7446
    por Dehio, Ludwig, 1888-1963
    Publicado 1925
    Libro
  7. 7447
    por Dahrendorf, Ralf, 1929-2009
    Publicado 1967
    Libro
  8. 7448
    por Greiffenhagen, Martin, 1928-
    Publicado 1971
    Libro
  9. 7449
    Publicado 2019
    Tabla de Contenidos: “…-- 1 SILLY NAME GENERATOR -- Project #1: Generating Pseudonyms -- Planning and Designing a Project -- The Code -- Summary -- Further Reading -- Practice Projects -- Challenge Projects -- 2 FINDING PALINGRAM SPELLS -- Finding and Opening a Dictionary -- Project #2: Finding Palindromes -- Project #3: Finding Palingrams -- dnE ehT -- Further Reading -- Practice Project: Dictionary Cleanup -- Challenge Project: Recursive Approach -- 3 SOLVING ANAGRAMS -- Project #4: Finding Single-Word Anagrams -- Project #5: Finding Phrase Anagrams -- Project #6: Finding Voldemort: The Gallic Gambit -- Project #7: Finding Voldemort: The British Brute-Force -- Summary -- Further Reading -- Practice Project: Finding Digrams -- Challenge Project: Automatic Anagram Generator -- 4 DECODING AMERICAN CIVIL WAR CIPHERS -- Project #8: The Route Cipher -- Project #9: The Rail Fence Cipher -- Summary -- Further Reading -- Practice Projects -- Challenge Projects -- 5 ENCODING ENGLISH CIVIL WAR CIPHERS -- Project #10: The Trevanion Cipher -- Project #11: Writing a Null Cipher -- Summary -- Further Reading -- Practice Projects -- 6 WRITING IN INVISIBLE INK -- Project #12: Hiding a Vigenère Cipher -- The Platform -- The Strategy -- The Pseudocode -- The Code -- Detecting the Hidden Message -- Summary -- Further Reading -- Practice Project: Checking the Number of Blank Lines -- Challenge Project: Using Monospace Font -- 7 BREEDING GIANT RATS WITH GENETIC ALGORITHMS -- Finding the Best of All Possible Solutions -- Project #13: Breeding an Army of Super-Rats -- Project #14: Cracking a High-Tech Safe -- Further Reading…”
    Libro electrónico
  10. 7450
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Data Hiding Techniques in Windows OS -- Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense -- Copyright -- Dedication -- Contents -- Biography -- Preface -- ABOUT THIS BOOK -- TARGET AUDIENCE -- SUMMARY OF CONTENTS -- COMMENTS AND QUESTIONS -- Acknowledgments -- 1 - Introduction and Historical Background -- INTRODUCTION -- CLASSICAL CIPHER TYPES -- Substitution Cipher -- Monoalphabetic Ciphers -- Caesar Shift -- Atbash Cipher -- Keyword Cipher -- Polyalphabetic Ciphers -- Vigenère Cipher -- AutoKey Cipher -- Polygraphic Ciphers -- Playfair Cipher -- Mechanical Substitution Ciphers -- The Enigma Machine -- Transposition Cipher -- Rail Fence -- Columnar Transposition -- Double Transposition -- Other Ciphers and Codes -- The One-Time Pad -- Morse Code -- Book Cipher -- Difference Between Substitution and Transposition Cipher -- Practicing Old Ciphers Using Modern Computing -- MODERN CRYPTOGRAPHY SYSTEMS -- Secret Key Cryptography -- Public Key Cryptography -- Digital Signature -- Cryptographic Hash Function -- STEGANOGRAPHY -- What Is Steganography? …”
    Libro electrónico
  11. 7451
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  12. 7452
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributor -- Table of Contents -- Preface -- Chapter 1: Obfuscation -- About cryptography -- Installing and setting up Python -- Using Python on Mac or Linux -- Installing Python on Windows -- Caesar cipher and ROT13 -- Implementing the Caesar cipher in Python -- ROT13 -- base64 encoding -- ASCII data -- Binary data -- XOR -- Challenge 1 - the Caesar cipher -- Challenge 2 - base64 -- Challenge 3 - XOR -- Summary -- Chapter 2: Hashing -- MD5 and SHA hashes -- What are hashes? …”
    Libro electrónico
  13. 7453
    Publicado 1998
    Libro
  14. 7454
    Publicado 2016
    Libro
  15. 7455
    por Küng, Hans, 1928-2021
    Publicado 1982
    Libro
  16. 7456
    Publicado 2012
    991004732839706719
  17. 7457
    Publicado 1988
    Libro
  18. 7458
    por Esswein, Hermann
    Publicado 1923
    Libro
  19. 7459
    por Pfeiffer, Heinrich
    Publicado 1977
    Libro
  20. 7460
    por Willms, Bernard
    Publicado 1987
    Libro